mobile devices
Protect your computer and phone from illegal police searches
Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your home to search …
Portable Microsoft endpoint for secure cloud computing
SPYRUS announced Secure Pocket Drive, the first and only licensed device that boots Microsoft’s mobile, flagship operating system, Windows Embedded Standard 7, from an …
The mobile security conundrum
Whilst the range and variety of IT security defenses for portable computers – that’s netbooks and laptops to most people – is excellent, and able to cater …
Protect yourself while surfing the mobile web
Lookout Mobile Security introduced Safe Browsing to protect against online threats when surfing the Web from a mobile device. Safe Browsing users can feel confident that they …
F-Secure Mobile Security 7 protects smartphones and tablets
The mobile world is changing fast. Smartphones and tablet computers are at the cutting edge of technological sophistication and defining what is cool to a new generation of …
Two-factor authentication for Mailchimp using AlterEgo
MailChimp is an innovative company that provides mailing list management services with a twist. Their down-to-earth approach and focus towards the best user experience is what …
History and future of mobile malware
Panda Security released a report on the history, current state and future of mobile malware which aims to raise awareness of the threats affecting mobile devices as well as …
Study examining the usage of hardware-based encrypting drives
The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …
Forensic data capture and data extraction
Logicub announced the Talon Enhanced forensic data capture solution and the CellXtract data extraction solution for mobile devices. The Talon Enhanced provides fast data …
Security a top concern for mobile cloud-based applications
48 percent of a Vordel study respondents noted security as a top concern for connecting from mobile cloud-based applications into the organization. The security challenges …
Physical, logical and mobile authentication in one software
Entrust released IdentityGuard 10.0, which brings together security solutions for physical, logical and mobile access. This latest update to Entrust’s authentication …
Employee-owned mobile devices are riskiest
More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by …
Featured news
Sponsored
Don't miss
- Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
- LastPass users targeted by vishing attackers
- Protobom: Open-source software supply chain tool
- The key pillars of domain security
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)