Please turn on your JavaScript for this page to function normally.
Anti-theft system for PCs and Android devices

Bitdefender launched an anti-theft system for PCs and Android devices that turns the tables on thieves, giving you control over your phone, laptop or tablet even when …

Ghost USB honeypot released

Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …

Free mobile security eBook from Veracode

Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the …

Growing security demands, old security infrastructure

SMBs are struggling to keep IT infrastructures up to date with current working practices and more advanced threats, according to Sophos. According to the survey, 93 percent of …

Implications of the rise of mobile devices

CIOs and IT leaders must address three key implications of the “post-PC” era, as workforces and consumers increasingly access IT applications and content through …

Mobile workspace offers a secure Windows OS on any computer

Imation announced Stealth Zone 2.1 boot-from-USB secure mobile workspace. This new version enhances data security by making it easier and more convenient for business …

World’s first secure private mobile carrier

New revelations about abuses by social networks and search giants are only the tip of the iceberg when it comes to security threats today. Not only are these organizations …

Manage, secure and support mobile users

Unisys announced its Mobility Solutions Suite of services designed to help organizations manage, secure and support mobile devices such as smartphones and tablets – as …

Facebook unveils new mobile security measures

Facebook has introduced three security updates for protecting its mobile users: a code generator, the ability to report unwanted content on your phone, and improved mobile …

Over 50% use unauthorized file sharing apps at work

While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …

People would rather lose their wallet than their phone

People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …

IBM releases software for developing secure mobile apps

IBM announced new software to help organizations develop mobile applications that are more secure by design. Now, clients can build security into the initial design of their …

Don't miss

Cybersecurity news