Quantcast
Channel: Mobility
Browsing all 424 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article


Image may be NSFW.
Clik here to view.

Impact Team to Ashley Madison – Shut down or Else!

Brian Krebs reports that Ashley Madison, a self-proclaimed site for extra-marital affairs, has been successfully breached. The attackers, a group calling themselves the “Impact Team,” claim they’ve...

View Article


Image may be NSFW.
Clik here to view.

Built for the Cloud: Deep Security Now Available on the Azure Marketplace

All over the world, businesses are embracing cloud computing. From operational efficiency and greater business agility, to cost savings and even green IT gains, the benefits are well-known. Microsoft...

View Article

Image may be NSFW.
Clik here to view.

Catch Me If You Can: How APT Actors Are Moving Through Your Environment...

Companies that have experienced data breaches often wonder the same thing—“How were the hackers able to move through my environment for that long without being detected?” The average amount of dwell...

View Article

Image may be NSFW.
Clik here to view.

HR could play leading part in BYOD success

It's a trying time to be an IT director tasked with navigating a company's move from corporate-liable devices to a BYOD (Bring your own Device) program. Ryan Faas of CITEworld said the recent CITE...

View Article


Image may be NSFW.
Clik here to view.

Workforce mobilization becoming the new normal in healthcare

Although security is always a concern within healthcare organizations, many are opting into BYOD (Bring your own Device) programs to take advantage of several undeniable productivity and efficiency...

View Article

Image may be NSFW.
Clik here to view.

Attention to application security in BYOD boosts productivity, safety

The incorporation of mobile applications and adoption of a BYOD (Bring your own Device) policy likely means that organizations will see a notable rise in employee productivity levels.  A report from...

View Article

Image may be NSFW.
Clik here to view.

Medical offices using mobile need security policies

Healthcare, as with any other industry, is starting to see an influx of mobile devices in the workplace. TechTarget's James Brady wrote that these devices have emerged as one of the top drivers for...

View Article


Image may be NSFW.
Clik here to view.

Android lends a hand to mobile device managers

Android hasn't been getting the most positive press as of late, as there have been heightened complaints of malware versus other operating systems, but the company may soon be winning the favor of IT...

View Article


Image may be NSFW.
Clik here to view.

Russian cybercriminals turn Android malware into an industry

Google's Android mobile operating system has been a favored target of ambitious cybercriminals and a common conduit for malware distribution. The attacks on it are becoming more syndicated and...

View Article

Image may be NSFW.
Clik here to view.

Is biometrics-based authentication a silver bullet for mobile security?

Apple’s recently released iPhone 5S has brought biometrics-based authentication into the mainstream. One of the new high-end smartphone’s distinctive features is its Touch ID fingerprint scanner...

View Article

Image may be NSFW.
Clik here to view.

Mobile banking apps must be made more secure

How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...

View Article

Image may be NSFW.
Clik here to view.

Keeping Mobile Malware at Bay

There’s a lot of airtime devoted to all the different malicious threats that attack computers, but not as much attention is paid to mobile malware. That is starting to change, however, as mobile...

View Article


Image may be NSFW.
Clik here to view.

Consumers concerned about privacy of data in the Internet of Everything

The Internet of Things – sometimes called the Internet of Everything – was over the horizon for a long time, but now it is finally coming into view as IP connectivity is extended to a large number and...

View Article

Image may be NSFW.
Clik here to view.

Web browsers remain gateways for malware

Web browsers became widely used from the mid 1990s onward, following the early success of Netscape Navigator and the subsequent rise of Microsoft Internet Explorer as the default option on millions of...

View Article


Image may be NSFW.
Clik here to view.

Tax season security threats: TorrentLocker

Tax season brings different meanings for different groups of people. For employers, this is the time of year when they need to ensure that tax information for their staff is in order and that they...

View Article

Image may be NSFW.
Clik here to view.

Cyber security: The cooperation game

Competition is perhaps the most important component of the business sphere. After all, it's through brand and company competition that the best products end up hitting the marketplace. If Business 1 is...

View Article


Image may be NSFW.
Clik here to view.

What lies beneath: The deep web and future crimes

The Internet is like an iceberg: There's the part that's visible, and then there's the rest. When we use the Internet, we regard it as a vast, limitless expanse of data. And yet the Internet that we're...

View Article

Image may be NSFW.
Clik here to view.

BYOD security: Dealing with targeted attacks and zombie apps on mobile

Mobile security continues to be a challenging frontier for enterprises, many of which have only recently adopted bring-your-own-device policies and are still in the process of overhauling their...

View Article

Image may be NSFW.
Clik here to view.

How to deal with fake websites

Fake websites have long been a thorn in the side of both consumers and enterprises. The problem has become significant enough for some desktop Web browser makers, including Google and Apple, to...

View Article
Browsing all 424 articles
Browse latest View live