Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet. Mobile security and BYOD (bring your own device) ...
Tags: BYOD, mobile security, RSA, security conference
Data breaches in the UK across all sectors have increased an average of more than tenfold in the past five years, security firm Imation has uncovered. The Information Commissioner's Office (ICO) revealed the figures in response to a ...
Tags: Information Commissioner's Office, Data breaches, security firm, Imation
The UK national Cyber Security Challenge has announced the winner of its Can you talk security? competition devised by BT and Get Safe Online. Winner Leo Pickford, an IT manager at a design company, could soon see his ...
Tags: UK national Cyber Security Challenge, BT, Get Safe Online, net security
The University of Warwick has entered an agreement with information security professional body (ISC)2 to support the entry of its cyber security masters graduates into the workforce. Students will be able to complete a compact Certified ...
Tags: University of Warwick, CISSP, cyber security, IT security community
Research in Motion (RIM) has pinned all its hopes on its upcoming mobile operating system (OS) BlackBerry 10 (BB10). Despite promises to launch by the end of the year, the company's CEO, Thorsten Heins, told the world they would have to ...
Tags: mobile operating system, BlackBerry, system, distant memory
Global Leader in mobile cloud solutions shares ten must-have policies for mobile peace of mind. Fiberlink, a global leader in application management and software-as-a-service (SaaS) solutions for secure mobile device management delivered ...
Tags: Fiberlink, mobile cloud solutions, SaaS, Protect Mobility
Shopping or banking online depends on trust. Individuals interact with sites that they trust, and sites have to trust the person who is transacting with them. Many online banking sites are turning to two-factor authentication to confirm ...
Tags: Banking fraud, education issue, online banking, trust
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android, applications, critical, devices, vulnerabilities
Fiberlink, a global leader in software-as-a-service (SaaS) solutions for application management and secure mobile device management announced a free on-demand webinar titled "Squashing the Top 5 Mobile Security Threats." Enterprise ...
Tags: Fiberlink, software, software service, application management
Trend Micro has updated its mobile security software to detect potential attacks on several Samsung Electronics devices that have a flaw that could allow a malicious application to access all of the phone's memory. The company's Mobile ...
Tags: Samsung, Trend Micro, mobile security software, Mobile Security product
This is especially true of organizations subject to compliance with regulations like PCI-DSS or HIPAA, but any organization could find itself in trouble if it can't get its hands on emails and SMS messages during an ediscovery process. ...
Tags: IT, HIPAA, forensic investigations, mobile devices
With the advent of mobility and the influx of BYOD in enterprise, employers are struggling to keep control of their networks, according to John Yun, Director, Product Marketing, Blue Coat. Yun, who is in Dubai promoting Blue Coat’s ...
Tags: Blue Coat botnets, BYOD, cyber attacks, hackers
Late next year, consumers will be able to buy smartphones that either come with native hypervisor software or use an app allowing them to run two interfaces on the phone: one for personal use, one for work. The technology could help ...
Tags: AMD, Business devices, BYOD, consumer, Dual hypervisor, enterprise
Security threats to your mobile device such as malware, fraudulent lures such as SMS spoofing, and toll fraud, are all becoming favourites of digital crooks as people move away from using PCs and toward smartphones and tablets, according to ...
Tags: cybercrime, mobile devices, mobile security, PC, tablet
Cloud-security provider Zscaler has announced it has received $38 million in venture-capital funding, naming Lightspeed Ventures as a strategic investor but not the other venture-capital partners involved in the round. Until now, San ...
Tags: Cloud security funding, Mocana, Zscaler, venture capital funding