mobile devices
Sophos enhances mobile device management platform
Sophos announced Mobile Control 2.0, a mobile device management solution that supports iPhones and iPads, Android phones and tablets, Windows Mobile devices and RIM BlackBerry …
The risks of online shopping
More people than ever are using their personally owned smartphones to send and receive e-mails, browse the Internet, shop online and visit social media sites – as well …
Key security threats in the coming year
The widespread adoption of mobile devices, proliferation of applications and growth of cloud computing are helping accelerate business innovation and social benefits. However, …
Mobile pickpocketing and botnets will rise
Mobile threats are on the rise — Lookout estimates that mobile threats successfully stole more than one million dollars from Android users in 2011. In 2012, Lookout predicts …
Top 5 authentication predictions for 2012
Confident Technologies offers their top 5 authentication predictions for 2012. They include authentication trends that they think will emerge next year, as well as some …
Windows Phone 7.5 bug disables messaging option
A bug in the recently released Windows Phone 7.5 mobile OS can be exploited to make people’s phones lose the ability to send messages by cutting access to the messaging …
Holiday travel is risky business for mobile devices
The holidays are a time for tropical getaways, traveling to Grandma’s house to see family and friends and one of the likeliest times a person will lose their mobile …
Premium SMS fraudulent apps target European users
European mobile phone users should be on the lookout for premium SMS toll fraud apps as a great number of them has been lately discovered on file sharing sites, third-party …
SMS Privato Spy: Another piece of bogus software for sale
Every so often, a new piece of non-existent software gets advertised by scammers that are eager to part users with their hard earned cash. The latest one to be spotted is …
The value of securing Internet enabled devices
From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely to be at the top of many consumers’ Christmas wish lists this year. …
2012 network security trends
Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently …
Mobile carriers to blame for use of secret logging software?
The recent revelation that most Android, BlackBerry and Nokia phones are installed with the Carrier IQ software that logs practically all actions made by the mobile phone …
Featured news
Resources
Don't miss
- Cybersecurity essentials for the future: From hype to what works
- How FinTechs are turning GRC into a strategic enabler
- Secretless Broker: Open-source tool connects apps securely without passwords or keys
- Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC
- Microsoft introduces protection against email bombing