Read more about mobile devices
Bookmark and Share
  • What all major brands share in common with the Snappening

    21.10.2014

    By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat.

  • Whitepaper: Smart Devices, Smart Security

    16.10.2014

    Once mostly prohibited by IT, smartphones and tablets are now being used by hundreds of millions of employees worldwide to access, transmit and store corporate information in today's 24x7 business environment.

  • Detecting cyber attacks in a mobile and BYOD organization

    14.10.2014

    Many organizations understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.

  • Leaked Snapchat images came from third-party server

    13.10.2014

    Snapchat is a mobile photo messaging app that allows users to send pictures that "self-destruct" a few moments after being viewed, and is especially popular with those who think it perfect for sending pictures of a delicate and private nature.

  • Education is the key to increasing mobile security

    29.09.2014

    In order to empower people to take control of their digital assets, consumers must first understand that simply picking a pet’s name and adding a 1 to the end for a password or using a four digit PIN based on their date of birth is not enough to secure the wealth of information they carry around in their pockets.




Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //