mobile devices
Protect yourself while surfing the mobile web
Lookout Mobile Security introduced Safe Browsing to protect against online threats when surfing the Web from a mobile device. Safe Browsing users can feel confident that they …
F-Secure Mobile Security 7 protects smartphones and tablets
The mobile world is changing fast. Smartphones and tablet computers are at the cutting edge of technological sophistication and defining what is cool to a new generation of …
Two-factor authentication for Mailchimp using AlterEgo
MailChimp is an innovative company that provides mailing list management services with a twist. Their down-to-earth approach and focus towards the best user experience is what …
History and future of mobile malware
Panda Security released a report on the history, current state and future of mobile malware which aims to raise awareness of the threats affecting mobile devices as well as …
Study examining the usage of hardware-based encrypting drives
The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …
Forensic data capture and data extraction
Logicub announced the Talon Enhanced forensic data capture solution and the CellXtract data extraction solution for mobile devices. The Talon Enhanced provides fast data …
Security a top concern for mobile cloud-based applications
48 percent of a Vordel study respondents noted security as a top concern for connecting from mobile cloud-based applications into the organization. The security challenges …
Physical, logical and mobile authentication in one software
Entrust released IdentityGuard 10.0, which brings together security solutions for physical, logical and mobile access. This latest update to Entrust’s authentication …
Employee-owned mobile devices are riskiest
More than half of information technology leaders in the US believe that any employee-owned mobile device poses a greater risk to the enterprise than mobile devices supplied by …
25 years of mobile security
This year marks the 25th anniversary of my first foray into mobile security. True story. Back in the day, the early halcyon days of mobile computing, any device weighing in at …
Mobile users: Risky behavior and weak security
Researchers found that while an increasing number of consumers use mobile devices for both business and personal activities, large numbers are not familiar with their …
The progress of IT threats in 2010
Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)