mobile devices
Identify and block mobile malware on enterprise networks
Sourcefire announced new advancements for delivering visibility and control to help enterprises protect against threats that result from mobility and Bring Your Own Device …
Anti-theft system for PCs and Android devices
Bitdefender launched an anti-theft system for PCs and Android devices that turns the tables on thieves, giving you control over your phone, laptop or tablet even when …
Ghost USB honeypot released
Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …
Free mobile security eBook from Veracode
Veracode released a free eBook that outlines the ten steps that can be taken by individuals and organizations to protect against potential security risks brought on by the …
Growing security demands, old security infrastructure
SMBs are struggling to keep IT infrastructures up to date with current working practices and more advanced threats, according to Sophos. According to the survey, 93 percent of …
Implications of the rise of mobile devices
CIOs and IT leaders must address three key implications of the “post-PC” era, as workforces and consumers increasingly access IT applications and content through …
Mobile workspace offers a secure Windows OS on any computer
Imation announced Stealth Zone 2.1 boot-from-USB secure mobile workspace. This new version enhances data security by making it easier and more convenient for business …
World’s first secure private mobile carrier
New revelations about abuses by social networks and search giants are only the tip of the iceberg when it comes to security threats today. Not only are these organizations …
Manage, secure and support mobile users
Unisys announced its Mobility Solutions Suite of services designed to help organizations manage, secure and support mobile devices such as smartphones and tablets – as …
Facebook unveils new mobile security measures
Facebook has introduced three security updates for protecting its mobile users: a code generator, the ability to report unwanted content on your phone, and improved mobile …
Over 50% use unauthorized file sharing apps at work
While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to …
People would rather lose their wallet than their phone
People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits