The number of consumer smartphone and tablets brought into workplaces will more than double by 2014, according to a recent study, but security on the endpoints is lacking. Juniper Research claims the number of devices being used in the ...
Tags: BYOD devices, smartphone, tablets, mobile devices
Westinghouse Electric Company and McAfee have announced a partnership around information security for nuclear power plants at McAfee Focus 2012 in Las Vegas. Westinghouse will use McAfee Enterprise Security Manager and Network Intrusion ...
Tags: Westinghouse Electric Company, McAfee, Las Vegas, Prevention Systems
Security company McAfee has announced four enhancements of endpoint security as part of its Security Connected strategy at McAfee Focus 2012 in Las Vegas. While first-generation security focused on finding and fixing known threats, ...
Tags: McAfee, enhancements of endpoint, Security Connected strategy, Las Vegas
Computerworld-Microsoft confirmed Wednesday that owners of Windows RT hardware,including the company's own Surface RT,must acquire a commercial license for Office 2013 to use those devices'bundled Office apps at and for work. The ...
Tags: Windows RT hardware, Microsoft, commercial license, touch-enabled apps
Apple is set to announce its latest smartphone, which will be called the iPhone 5, at an event in San Francisco shortly. The phone is rumoured to be LTE compatible, meaning it will benefit from 4G services, currently being implemented in ...
Tags: smartphone, iPhone 5, Apple, LTE
Nokia today revealed its latest flagship Lumia smartphone to the world,dubbed the Lumia 920,running Microsoft's upcoming mobile operating system(OS),Windows Phone 8. Despite looking much like its previous range of flagship mobiles,a raft ...
Tags: Lumia, Nokia users, OS, Windows Phone 8
Online cyber criminal markets are putting very sophisticated attack tools into the hands of more low-level attackers, say cyber intelligence specialists. More attackers are now getting their hands on tools like Zeus and SpyEye, according ...
Tags: Online cyber criminal, sophisticated attack tools, Cyber Attack Tools
More than two-fifths of companies worldwide have failed to prepare for cyber threats, a survey from security company Kaspersky Lab has revealed. Some 41% of more than 3,300 IT professionals polled in 22 countries – including 200 in ...
Tags: cyber threats, Kaspersky, online attacks
Extending its line of identity management software, Quest Software has released an application to help administrators more easily control who accesses documents on the corporate network. While enterprise applications such as Oracle's ...
Tags: Quest, software, identity management software, enterprise applications
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers,according to KPMG. More than three quarters of organisations in the Forbes 2000 are leaking data,potentially creating ...
Tags: KPMG, Online Risk, hacker attack, security threat
Communications supplier Virgin Media has revolutionised the way it trains staff through cloud-based learning supplier Cornerstone. Virgin Media was the result of the coming together of cable suppliers NTL and Telewest,which were ...
Tags: Virgin Media, cable suppliers, NTL, Telewest, Cornerstone service
Table of contents Public Wi-Fi hotspot dangers Security of 3G and 4G-based hotspots Network access requires careful management Educating users about security risks Network security controls and practices are among the most mature,but can ...
Tags: Public Wi-Fi hotspot, 3G and 4G-based hotspots, security risks