smartphones
BYOD reality: Missing mobile device usage policies
Gone are the days when employees only used a company-issued phone or laptop for work. Today, employees bring personal smartphones and tablets to the office and often have …
Broadcom introduces 5G WiFi combo chip for smartphones
Broadcom introduced the BCM4335, the first complete 5G WiFi combo chip for smartphones, tablets, ultrabooks and other mobile devices. 5G WiFi, the 5th generation of Wi-Fi …
Blue Coat delivers mobile application controls
Blue Coat introduced mobile application controls that close the security gap created by unsanctioned mobile applications on the corporate network. The growth in bring your own …
Facebook API bug deletes contact info on users’ phones
If you thought that Facebook’s recent unannounced change of its users’ email address tied with their account to Facebook ones was bad, you’ll be livid if you …
Removing the fear factor from BYOD
In May, HM Revenue and Customs (HMRC) said that it would ignore the government’s advice on BYOD (bring your own device) because of concerns around the security of the …
App retrieving contactless credit card details pulled from Google Play
The Near Field Communication (NFC) protocol – supported and present on the latest smartphones – can be misused to steal data, say Symantec researchers. They tested …
Identify and block mobile malware on enterprise networks
Sourcefire announced new advancements for delivering visibility and control to help enterprises protect against threats that result from mobility and Bring Your Own Device …
Facebook unveils new mobile security measures
Facebook has introduced three security updates for protecting its mobile users: a code generator, the ability to report unwanted content on your phone, and improved mobile …
People would rather lose their wallet than their phone
People would prefer to lose the contents of their wallets than their mobile phones. A SecurEnvoy study asked what people would most fear losing from their back pocket – …
RuFraud scammers caught and fined
Cyber scammers are still too rarely brought to justice and/or made to pay back the stolen money to the users they have swindled, so any news of that happening is extremely …
How to remove the backdoor from ZTE’s Score M smartphone
The existence of the recently discovered vulnerability in ZTE’s Score M smartphone which allows any attacker in possession of the hardcoded password to access and take …
Leveraging PCI standards to accept mobile payments securely
The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …
Featured news
Resources
Don't miss
- CISA: Recently fixed Chrome vulnerability exploited in the wild (CVE-2025-4664)
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations