mobile devices
The progress of IT threats in 2010
Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …
Mobile Encryption for iOS and Android
Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …
Portable biometric fingerprint scanner for iPod touch
Fulcrum Biometrics announced its FbF mobileOne fingerprint biometric accessory and companion app are now available for iPod touch. FbF mobileOne is the world’s first …
First mobile wireless storage for iOS
Seagate announced GoFlex Satellite mobile wireless storage, the first battery-powered external hard drive to wirelessly extend the storage capacity of any Wi-Fi enabled mobile …
Tips for guarding against mobile malware threats
In order to guard against growing mobile malware threats, Juniper Networks offers the tips below. For consumers: Install an on-device anti-malware solution to protect against …
41% carry unprotected sensitive information on mobile devices
41 percent of what should be a security savvy audience are carrying sensitive information on mobile devices unprotected, according to Origin Storage. In fact, 19 percent …
The complex information security landscape
In this interview, Latha Maripuri, Director, IBM Security Services and Marc van Zadelhoff, Director of Strategy, IBM Security Solutions, discuss the increasingly complex …
Fake AV for mobile platform detected
Fake antivirus software for Windows crop up daily, but it seems that mobile users will also have to start being on the lookout for such scams. CA researchers have spotted a …
Michigan State Police denies downloading drivers’ phone data
A few days ago, the American Civil Liberties Union of Michigan made public their belief that the Michigan State Police might have been using portable devices that allowed them …
Michigan police downloading drivers’ phone data without warrants?
For a few years now, the Michigan State Police has been using portable devices that allow them to secretly extract personal information from cell phones of drivers who have …
Secure access for any device with Cisco
Cisco introduced new security, management, and video solutions to its Borderless Networks portfolio to help information technology departments more efficiently manage the …
Managed government-level secure USB from Kingston
Kingston announced the DataTraveler 4000-M Managed (DT4000-M) USB Flash drive, a fully managed version of the company’s DataTraveler 4000 product. Specifically developed …
Featured news
Resources
Don't miss
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies