mobile devices
Flaw in boarding pass check system puts fliers in danger
Everybody knows by now that airline boarding passes have barcodes that, when decoded, show a series of letters and numbers that “summarize” the main information …
Why mobile malware is big in China and Russia
According to Lookout’s State of Mobile Security Report 2012, “Toll Fraud” malware has become the most prevalent type of malware within the past year due to …
BYOD security and control fears
Enterprises are restricting employee access to vital work applications due to security and control fears, according to Ping Identity. Employees were found to use an average of …
Free mobile app profiler for risk assessment
At RSA Conference Europe 2012, Zscaler announced the results of an analysis from ThreatLabZ which reveals that up to 10 percent of mobile apps expose user passwords and login …
Cloud Security Alliance outlines top mobile threats
The Cloud Security Alliance (CSA) Mobile Working Group released findings from a new survey that calls out the specific security concerns enterprise executives say are the real …
Interesting times for information security professionals
There is an old saying, which some attribute as an old Chinese proverb, that states “May you live in interesting times.” Some say that this is a blessing you may …
F-Secure Mobile Security protects Android TVs and set-top boxes
F-Secure launched a new version of F-Secure Mobile Security which features support for standard Android devices including TVs and set-top boxes. The new version also comes …
Key components for mobile device management of BYOD
The Cloud Security Alliance (CSA) Mobile Working Group released a research report identifying 17 key elements that are critical for organizations to consider for the full …
RSA unifies identity and access management
RSA announced new solutions within its Identity and Access Management (IAM) suite designed to address security challenges that require new ways to manage and protect the …
Trend Micro expands consumer mobile portfolio
Trend Micro expanded its consumer mobile offerings to secure, enhance and simplify people’s mobile lives. The new release of Trend Micro Mobile Security Personal Edition …
The QR code: A new frontier in mobile attackability
A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite …
WD unveils thinnest 2.5-inch hybrid hard drive
WD announced it is sampling a 5mm-thin hard disk drive featuring hybrid technology. WD has developed hard drives slim enough for integration into today’s thinnest …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)