Please turn on your JavaScript for this page to function normally.
Protect your computer and phone from illegal police searches

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …

Portable Microsoft endpoint for secure cloud computing

SPYRUS announced Secure Pocket Drive, the first and only licensed device that boots Microsoft’s mobile, flagship operating system, Windows Embedded Standard 7, from an …

The mobile security conundrum

Whilst the range and variety of IT security defenses for portable computers – that’s netbooks and laptops to most people – is excellent, and able to cater …

Protect yourself while surfing the mobile web

Lookout Mobile Security introduced Safe Browsing to protect against online threats when surfing the Web from a mobile device. Safe Browsing users can feel confident that they …

F-Secure Mobile Security 7 protects smartphones and tablets

The mobile world is changing fast. Smartphones and tablet computers are at the cutting edge of technological sophistication and defining what is cool to a new generation of …

Two-factor authentication for Mailchimp using AlterEgo

MailChimp is an innovative company that provides mailing list management services with a twist. Their down-to-earth approach and focus towards the best user experience is what …

History and future of mobile malware

Panda Security released a report on the history, current state and future of mobile malware which aims to raise awareness of the threats affecting mobile devices as well as …

Study examining the usage of hardware-based encrypting drives

The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …

Forensic data capture and data extraction

Logicub announced the Talon Enhanced forensic data capture solution and the CellXtract data extraction solution for mobile devices. The Talon Enhanced provides fast data …

Security a top concern for mobile cloud-based applications

48 percent of a Vordel study respondents noted security as a top concern for connecting from mobile cloud-based applications into the organization. The security challenges …

Physical, logical and mobile authentication in one software

Entrust released IdentityGuard 10.0, which brings together security solutions for physical, logical and mobile access. This latest update to Entrust’s authentication …

Employee-owned mobile devices are riskiest

More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by …

Don't miss

Cybersecurity news