Quantcast
Channel: Mobility
Browsing all 424 articles
Browse latest View live

Apply lessons learned from Wi-Fi to help BYOD

It wasn't long ago that companies first had to figure out their Wi-Fi policies and make sure everything was secure across the network. Now, businesses are dealing with mobile devices as a...

View Article


Malware infecting 58 million US PCs

With threats online looming larger than ever before, data security is now imperative for all users, whether at home or working in an office setting. Coming to a bill of about $4 billion, Consumer...

View Article


HR could play leading part in BYOD success

It's a trying time to be an IT director tasked with navigating a company's move from corporate-liable devices to a BYOD (Bring your own Device) program. Ryan Faas of CITEworld said the recent CITE...

View Article

Workforce mobilization becoming the new normal in healthcare

Although security is always a concern within healthcare organizations, many are opting into BYOD (Bring your own Device) programs to take advantage of several undeniable productivity and efficiency...

View Article

Attention to application security in BYOD boosts productivity, safety

The incorporation of mobile applications and adoption of a BYOD (Bring your own Device) policy likely means that organizations will see a notable rise in employee productivity levels.  A report from...

View Article


Medical offices using mobile need security policies

Healthcare, as with any other industry, is starting to see an influx of mobile devices in the workplace. TechTarget's James Brady wrote that these devices have emerged as one of the top drivers for...

View Article

Android lends a hand to mobile device managers

Android hasn't been getting the most positive press as of late, as there have been heightened complaints of malware versus other operating systems, but the company may soon be winning the favor of IT...

View Article

Russian cybercriminals turn Android malware into an industry

Google's Android mobile operating system has been a favored target of ambitious cybercriminals and a common conduit for malware distribution. The attacks on it are becoming more syndicated and...

View Article


Is biometrics-based authentication a silver bullet for mobile security?

Apple’s recently released iPhone 5S has brought biometrics-based authentication into the mainstream. One of the new high-end smartphone’s distinctive features is its Touch ID fingerprint scanner...

View Article


Mobile banking apps must be made more secure

How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...

View Article

Image may be NSFW.
Clik here to view.

Hacking Team Adobe Flash Zero-Day

Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at the latest zero-day exploit affecting all versions of Adobe Flash Player. We encourage you to scroll...

View Article

Image may be NSFW.
Clik here to view.

What you need to know about the Hacking Team Flash Zero Day

There has been a lot of discussion in the past few days about the successful attack against the Hacking Team in Italy and the release of their data as a result of that attack. The most important thing...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro: Proud Member of the AWS SaaS Partner Program

At Trend Micro, we’ve always prided ourselves on being innovators in security. A few years ago, we identified cloud computing as the next big trend and started investing. We invested both in building...

View Article


Image may be NSFW.
Clik here to view.

The Latest on the OPM Hack: 21 Million Affected

The United States Office of Personnel Management (OPM) has just released the latest details from their ongoing investigation into the attacks against their systems. Today’s announcement represents a...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

Update: Hacking Team Flash Zero Day – Not Out of the Woods

On Wednesday, Adobe released a new version of Flash on Wednesday to address the zero-day vulnerability that was disclosed as part of the Hacking Team attack last weekend. Unfortunately, our researchers...

View Article

Image may be NSFW.
Clik here to view.

Update: The Hacking Team Flash Zero-Day Trifecta

Trend Micro’s researchers have reported a third zero-day vulnerability (CVE-2015-5123) in Adobe Flash, a result from last week’s Hacking Team attack to the Adobe Security Team. Similar to the second...

View Article


Image may be NSFW.
Clik here to view.

Pawn Storm: First Java Zero-Day Attack in Two Years Targets NATO & US Defense...

Overnight, Trend Micro’s research teams identified a new attack in the ongoing Pawn Storm campaign that is focused on high-profile, sensitive targets. The Trend Micro™ Smart Protection Network™ has...

View Article

Image may be NSFW.
Clik here to view.

How Online Crime Gets Online and Stays Online: Bulletproof Hosting Services

Online crime is a big business. Various estimates put the total cost of online crime worldwide in the hundreds of billions of dollars. At Trend Micro, we’ve analyzed different aspects of online crime...

View Article

Image may be NSFW.
Clik here to view.

What Smart Device Makers Must Do to Drive the IoT Revolution

From fitness trackers to head-mounted displays and even connected home appliances, the Internet of Things (IoT) and smart devices are commanding serious column inches in the media these days. But the...

View Article
Browsing all 424 articles
Browse latest View live