Please turn on your JavaScript for this page to function normally.
Secure Microsoft Office collaboration via any device

WatchDox Apps for WatchDox Enterprise and Enterprise ES is the first offering to grant enterprise users secure Microsoft Office collaboration capabilities via any desktop, …

Security professionals don’t have secure mobile habits

Security professionals have embraced BYOD and they’re taking “anytime, anywhere” access to some pretty interesting locations according a new survey by Ping …

The security risks of using Wi-Fi on the Tube

The arrival of widespread public Wi-Fi access across London Underground has been broadly welcomed by the general public, particularly those with smartphones and tablets who …

Route1 releases MobiKEY for iPad

Route1 released MobiKEY technology for the iPad. MobiKEY is a complete desktop, secure remote access technology that integrates multi-factor authentication and identity …

Complex malware and BYOD drive mobile security

Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …

A look at how consumers safeguard their devices

While consumers who have lost a smartphone or had one stolen in the past are significantly more likely to be taking basic protective measures with their current device, nearly …

Mobile device data recoveries surge

Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more …

Apple adds two-step verification option to iCloud accounts

Apple has finally introduced a two-step verification feature that will allow its users to secure their iCloud (Apple ID) accounts, 9 to 5 Mac reports. The option is currently …

Researcher points out critical Samsung Android phone vulnerabilities

Tired of waiting for Samsung to fix a string of critical flaws in their smartphones running Android, Italian security researcher Roberto Paleari has decided to inform the …

Protecting sensitive information on iOS devices

We’ve seen the deep technical research showing what makes iOS devices secure (or sometimes not so much). But once you grok ASLR and code signing, are you really any …

Unified identity services across data center, mobile and cloud

Tom Kemp is co-founder and CEO of Centrify Corporation, a software and cloud security provider that delivers solutions that centrally control, secure and audit access to …

Tips for removing data from mobile devices

AVG released tips on how consumers can remove their personal data before they recycle or throw away their old smartphones. In an era of frequent and seamless device upgrades, …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools