mobile devices
Power to the people: Securing consumerized devices
The consumerization genie is out of the bottle. Employees are increasingly using consumer-focused websites and apps such as Twitter, Facebook and LinkedIn for work-related …
How to secure patient records on mobile devices
Mobile devices have become as common as the stethoscope in patient’s rooms. Physicians routinely review patients’ electronic health records (EHR), read test …
Android malware trends
Could it be that 2011 is the year when the long-standing predictions about the rise of mobile malware come true? Symantec’s Irfan Asrar thinks that there are definite …
Secure platform for connected mobile devices
AuthenTec introduced its new SafeZone secure platform solution for mobile and consumer systems on a chip (SoCs). The SafeZone Secure Platform solution allows chip makers and …
Vodafone femtocell hack allows call interception on unpatched devices
News that The Hacker’s Choice had revealed a proof-of-concept attack for hacking Vodafone’s Sure Signal femtocells (routers for boosting phone signals) and turning …
Secure mobile device access on single authentication platform
SafeNet announced its new mobile device credentialing solution that enables the secure use of consumer mobile devices on corporate networks. SafeNet’s Authentication …
Travelers left 11,000 mobile devices at U.S. airports
Travelers left behind more than 11,000 laptops, tablet PCs, smartphones and USB sticks in airports in the United States during the past year. Credant was able to gather survey …
Security precautions for mobile business applications
Mobile applications have become one of the hottest trends, but this has come at a price. The sharp rise in popularity means businesses are rushing their apps to the market, …
Encrypted voice calling for the iPhone
Cellcrypt Mobile for iPhone provides voice call encryption for commercially available off-the-shelf cell phones using government-certified security through an easy-to-use …
Protect your computer and phone from illegal police searches
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …
Portable Microsoft endpoint for secure cloud computing
SPYRUS announced Secure Pocket Drive, the first and only licensed device that boots Microsoft’s mobile, flagship operating system, Windows Embedded Standard 7, from an …
The mobile security conundrum
Whilst the range and variety of IT security defenses for portable computers – that’s netbooks and laptops to most people – is excellent, and able to cater …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)