Read more about mobile devices
Bookmark and Share
  • Exploring the mobile security landscape

    07.07.2014

    In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping the enterprise mobile security landscape, and offers advice for CISOs trying to protect data confidentiality and integrity while working with an increasingly mobile workforce.

  • Security weakness found in WiFi enabled LED light bulb

    07.07.2014

    Researchers at Context Information Security have been able to expose a security weakness in a WiFi enabled, energy efficient LED light bulb that can be controlled from a smartphone.

  • 5 essential mobile security tips

    30.06.2014

    It doesn't matter if you're using iOS, Android, Windows Phone or BlackBerry, these tips apply to every mobile device that connects to the Internet.

  • Cops must get a warrant before looking through cellphone content

    26.06.2014

    The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can't search the contents of an arrested individual's cell phone(s) without a search warrant.

  • Invasive Selfmite SMS worm uncovered

    26.06.2014

    AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite.




Spotlight

The evolution of backup and disaster recovery

Posted on 25 July 2014.  |  Amanda Strassle, IT Senior Director of Data Center Service Delivery at Seagate Technology, talks about enterprise backup issues, illustrates how the cloud shaping an IT department's approach to backup and disaster recovery, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Jul 28th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //