Read more about mobile devices
Bookmark and Share
  • Exploring the BYOD security dynamic

    11.07.2014

    Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives.

  • Risks of selling used smartphones

    08.07.2014

    AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data.

  • Mobile banking users to exceed 1.75 billion by 2019

    08.07.2014

    Over 1.75 billion mobile phone users will have used their devices for banking purposes by the end of 2019, compared to 800 million this year, according to Juniper Research.

  • Exploring the mobile security landscape

    07.07.2014

    In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.

  • Security weakness found in WiFi enabled LED light bulb

    07.07.2014

    Researchers at Context Information Security have been able to expose a security weakness in a WiFi enabled, energy efficient LED light bulb that can be controlled from a smartphone.




Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //