mobile devices
Despite concerns, smartphone hotspot adoption grows
Sixty-two percent of smartphone users leverage their devices’ hotspot capabilities, an increase of nine percent since May 2012, according to a new uSamp survey of more …
BYOD is increasing IT frustration and loss of control
IT is concerned about rising mobility costs and feeling frustration and loss of control over BYOD, according to iPass and MobileIron. The majority of survey respondents (57 …
Business is booming for exploits, mobile malware
Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …
Malware controls 620,000 phones, sends costly messages
A new discovered malware is potentially one of the most costly viruses yet discovered. Uncovered by NQ Mobile, the “Bill Shocker” (a.expense.Extension.a) virus has …
SaaS mobile device, application and data management solution
AppSense released MobileNow, a SaaS based mobile device, application and data management solution designed for Enterprise and Mid-Market organizations that bridges …
How do you protect your phone and your data?
Given the risks we run in not securing our phones, you’d be forgiven for thinking it must be a task requiring a doctorate in computer science. In reality, however, …
Encrypted video and texting for iPhone and iPad
ZipaClip is a secure mobile video and texting application for iOS devices. The free version of ZipaClip allows users to send and receive fully-encrypted texts and video clips …
Create a secure browsing session on any Windows computer
Making online purchases and secure internet browsing is safer and easier than ever with the launch of Kanguru’s new Defender DualTrust, a new secure online access and …
Security intelligence solutions for mobile technology providers
Webroot announced the availability of a portfolio of internet security solutions that give mobile technology providers – from carriers to device manufacturers to mobile …
The arrival of the post-PC threat era
With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and …
Fake game apps flood Google Play
Android users are once again in danger of getting their information collected and being hit by an unending stream of spam and unwelcome offers just because they searched for …
The end of strong password-only security
More than 90% of user-generated passwords will be vulnerable to hacking in a matter of seconds, according to Deloitte’s Canadian Technology, Media & …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!