Security and management for iOS
3LM released version 3.0 of its security and management platform which extends 3LM’s Mobile Device and Application Management (MDAM) support to any Android OS-based …
Cyber attackers target US natural gas pipeline companies
Unknown attackers are actively targeting natural gas pipeline sector companies in the US with spear phishing emails, the US Department of Homeland Security’s Industrial …
ForeScout and Fiberlink fortify mobile security
ForeScout and Fiberlink announced a partnership to deliver an integrated MDM and NAC offering. The new product, ForeScout MDM powered by MaaS360, combines cloud-based mobile …
Online banking fraud insurance scam
In their never ending effort to devise new schemes that defraud online banking accounts, criminals have come up with a scam that is both simple and extremely believable …
Sandbox added to Flash Player running on Firefox
As announced by Peleus Uhley, a senior security researcher within its Secure Software Engineering team, Adobe has outfitted the latest (beta) version of Adobe Flash Player …
Altus Mobile: Mobile location surveillance
Polaris Wireless announced Altus Mobile, a mobile location surveillance application, providing accurate mass location of all mobile devices operating on a cellular network, …
Cybercriminals are exploiting users of social networking sites
In April, cybercriminals were seen exploiting users of major social networking sites in order to spread malware and spam surveys, according to GFI Software. “In the same …
The personal cloud will eclipse the PC
The personal cloud is poised to eclipse the PC as the hub of consumers’ digital lives by 2014 as rapid growth in the use of apps and services introduces a new paradigm …
Healthcare concerns over data loss increase
While approaches to patient data protection have evolved over the past several years, the aggressive transition to electronic health records (EHR) and the consumerization of …
Webbots, Spiders, and Screen Scrapers, 2nd Edition
There’s a wealth of data online, but sorting and gathering it by hand can be tedious and time consuming. Rather than click through page after endless page, why not let …
FBI wants social networks and IM services to be wiretap-friendly
Worried that technology advances will leave its agents incapable of conducting surveillance of online communications of potential criminals, the FBI is quietly lobbying top …
Government workers unprotected against visual data leakage
Oculis Labs released results from its “Government Worker Privacy” survey on privacy risks for mobile workers. 104 people were randomly surveyed at this …
Featured news
Resources
Don't miss
- Fortinet warns about FortiSIEM vulnerability with in-the-wild exploit code (CVE-2025-25256)
- AWS CISO explains how cloud-native security scales with your business
- Product showcase: Apricorn Aegis NVX, a high-security, portable SSD
- How to build and grow a scalable vCISO practice as an MSP
- Global OT cyber risk could top $329 billion, new report warns