Read more about mobile devices
Bookmark and Share
  • Detecting cyber attacks in a mobile and BYOD organization

    14.10.2014

    Many organizations understand that traditional perimeter security defenses are not effective at identifying attacks on mobile devices.

  • Leaked Snapchat images came from third-party server

    13.10.2014

    Snapchat is a mobile photo messaging app that allows users to send pictures that "self-destruct" a few moments after being viewed, and is especially popular with those who think it perfect for sending pictures of a delicate and private nature.

  • Education is the key to increasing mobile security

    29.09.2014

    In order to empower people to take control of their digital assets, consumers must first understand that simply picking a pet’s name and adding a 1 to the end for a password or using a four digit PIN based on their date of birth is not enough to secure the wealth of information they carry around in their pockets.

  • Kali NetHunter turns Nexus devices into portable hacking tools

    24.09.2014

    Offensive Security, the security training company behind Kali Linux, the popular Debian-based OS designed for digital forensics and penetration testing, and Kali community member “BinkyBear” have created another great tool for pentesters: NetHunter.

  • Companies becoming lax in managing BYOD risk

    24.09.2014

    Exposure to risk is as much of a threat today as it was in 2013; however, organizations have become less diligent in BYOD management and mitigation, according to TEKsystems.




Spotlight

Leveraging network intelligence and deep packet inspection

Posted on 26 November 2014.  |  Tomer Saban, CEO of WireX Systems, talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 28th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //