Self-wiping hard drives from Toshiba

Toshiba announces a family of self-encrypting hard disk drives (HDDs) engineered to automatically invalidate protected data when connected to an unknown host. The new Toshiba …

Hacking Unified Communications security

A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …

Smartphone users feel more secure than PC users

Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …

The smartphone: A real bug in your bed

The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …

Malicious app found in Android Market

To infect a mobile device, the Rootcager/DroidDream Trojan used two known exploits: exploid and rageagainstthecage. If the first one failed to root the device, the malware …

Building the Mobile Internet

It is common knowledge that the world is going mobile, and that we want to be able to connect to the Internet wherever we are. As the Internet’s original protocols and design …