Read more about mobile devices
Bookmark and Share
  • Exploring the mobile security landscape

    07.07.2014

    In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.

  • Security weakness found in WiFi enabled LED light bulb

    07.07.2014

    Researchers at Context Information Security have been able to expose a security weakness in a WiFi enabled, energy efficient LED light bulb that can be controlled from a smartphone.

  • 5 essential mobile security tips

    30.06.2014

    It doesn't matter if you're using iOS, Android, Windows Phone or BlackBerry, these tips apply to every mobile device that connects to the Internet.

  • Cops must get a warrant before looking through cellphone content

    26.06.2014

    The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can't search the contents of an arrested individual's cell phone(s) without a search warrant.

  • Invasive Selfmite SMS worm uncovered

    26.06.2014

    AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite.




Spotlight

The role of the cloud in the modern security architecture

Posted on 31 July 2014.  |  Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //