mobile devices
Imation acquires IronKey’s security hardware business
Imation announced it will acquire the assets of IronKey’s secure data storage hardware business. The two companies also announced a strategic partnership whereby Imation …
Mobile threat vectors shift enterprise security strategies
Attacks on smartphones are becoming more common, and according to McAfee Labs, new malware targeting Android devices jumped 76 percent in the last quarter. The need to secure …
Secure remote file access for Mac and PC
iTwin is a USB device that allows two online computers to share military-grade encrypted data from anywhere in the world. Comprising two identical parts, iTwin can be …
Smartphone and tablet security tips
ICSA Labs is offering a series of tips that businesses and consumers can use to protect themselves from security risks aimed at smartphones, tablets and apps. 1. Only buy apps …
NFC-enabled BlackBerry smartphones will “open doors”
HID Global plans to support the company’s iCLASS digital keys and mobile secure identity on NFC-enabled BlackBerry smartphones. The new BlackBerry Bold 9900/9930 and …
Security case for iPhone 4
BungeeAir is based on a wireless technology that instantly creates a connection between your iPhone and a compact key fob to create a security tether keeping your phone and …
LockDown: USB 3.0 password protected HDD enclosure
Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …
Trend Micro enhances mobile security for Android
Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets. In January 2011, Trend Micro introduced …
90% of employees use personal devices for work
IT managers feel they lack the necessary tools to properly manage personal devices. A new survey by DELL Kace revealed 87 percent of companies have employees that use some …
HTML5-based mobile security platform
AirWatch released an HTML5-based MDM platform. By leveraging HTML5, AirWatch’s management console is now even more accessible from any web-connected device, regardless …
Mobile malware criminal command-and-control activity
Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …
Protect data on shared information networks
Unisys announced its Stealth Solution for Secure Virtual Terminal (SSVT), a secure solution residing on a federal government-certified USB device to help ensure that a mobile …
Featured news
Resources
Don't miss
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!
- Behind the scenes of cURL with its founder: Releases, updates, and security
- Product showcase: Exaforce – The full lifecycle AI SOC platform