Read more about mobile devices
Bookmark and Share
  • Exploring the mobile security landscape

    07.07.2014

    In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.

  • Security weakness found in WiFi enabled LED light bulb

    07.07.2014

    Researchers at Context Information Security have been able to expose a security weakness in a WiFi enabled, energy efficient LED light bulb that can be controlled from a smartphone.

  • 5 essential mobile security tips

    30.06.2014

    It doesn't matter if you're using iOS, Android, Windows Phone or BlackBerry, these tips apply to every mobile device that connects to the Internet.

  • Cops must get a warrant before looking through cellphone content

    26.06.2014

    The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can't search the contents of an arrested individual's cell phone(s) without a search warrant.

  • Invasive Selfmite SMS worm uncovered

    26.06.2014

    AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite.




Spotlight

Bash Shellshock bug: More attacks, more patches

Posted on 29 September 2014.  |  As vendors scramble to issue patches for the GNU Bash Shellshock bug and companies rush to implement them, attackers around the world are probing systems for the hole it opens.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 30th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //