Protect your corporate data on the go
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.
104 articles
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.
A look at how payment information is protected on smartphones that support contactless payments.
Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.
In this week’s podcast, Jeff and Dave discuss a breach impacting Massachusetts taxpayers, alien hackers, contactless payment fraud, and more.
Can’t resist the convenience of free Wi-Fi? Here’s a way to make it secure.
We’ve talked before about how today’s kids live simultaneously in the real and the digital world. The digital part is important, too — many believe depriving kids of their virtual life can
As you probably know, modern apps often spy on users — at least to the extent of tracking their locations. If your privacy matters to you and you use an
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more than
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused on
According to a survey conducted by Kaspersky Lab and B2B International over a 12-month period, 22% of parents polled indicated that their children were affected by cyber incidents. Examples of these incidents included
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Threats are everywhere on the Internet and they pose a serious danger to younger users. Moreover, use of mobile devices leave children even more vulnerable because they are free to surf
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.