Veracode released an infographic outlining the importance of mobile application security for children.
Addonics Technologies announced a family of USB hardware encryption solutions that protect data stored on hard drives, removable drives, flash media, optical media or in the cloud.
Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of researchers from the University of Alabama at Birmingham and the Polytechnic Institute of NYU, the answer is yes.
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs.
Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the potential for exploitation by skilled cyber-attackers says security expert Raul Siles.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.