mobile devices
Mobile banking security for Android
Webroot has announced it is extending mobile security applications to its partners in banking in order to protect their customers who use tablets and smartphones to conduct …
Entrust strengthens mobile security with device authentication
In an era when mobile devices are commonplace, Entrust introduces a straightforward method for adding digital certificates to mobile devices – and with little management …
Enterprises fail to control mobile access
The results of a Courion survey of 988 IT decision makers at large organizations indicate that whilst organizations are confident that they can assure appropriate user access …
Power to the people: Securing consumerized devices
The consumerization genie is out of the bottle. Employees are increasingly using consumer-focused websites and apps such as Twitter, Facebook and LinkedIn for work-related …
How to secure patient records on mobile devices
Mobile devices have become as common as the stethoscope in patient’s rooms. Physicians routinely review patients’ electronic health records (EHR), read test …
Android malware trends
Could it be that 2011 is the year when the long-standing predictions about the rise of mobile malware come true? Symantec’s Irfan Asrar thinks that there are definite …
Secure platform for connected mobile devices
AuthenTec introduced its new SafeZone secure platform solution for mobile and consumer systems on a chip (SoCs). The SafeZone Secure Platform solution allows chip makers and …
Vodafone femtocell hack allows call interception on unpatched devices
News that The Hacker’s Choice had revealed a proof-of-concept attack for hacking Vodafone’s Sure Signal femtocells (routers for boosting phone signals) and turning …
Secure mobile device access on single authentication platform
SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …
Travelers left 11,000 mobile devices at U.S. airports
Travelers left behind more than 11,000 laptops, tablet PCs, smartphones and USB sticks in airports in the United States during the past year. Credant was able to gather survey …
Security precautions for mobile business applications
Mobile applications have become one of the hottest trends, but this has come at a price. The sharp rise in popularity means businesses are rushing their apps to the market, …
Encrypted voice calling for the iPhone
Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …
Featured news
Sponsored
Don't miss
- GenAI can enhance security awareness training
- The relationship between cybersecurity and work tech innovation
- eBook: Cloud security skills
- Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
- CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)