Tag: mobile
-
Citrix Systems To Acquire Mobile Device Management Firm Zenprise
First seen on http: Jump to article: t.co/Y1j0ge7u
-
Skills and security are the biggest barriers to successful business
The annual IBM Tech Report highlights four new technologies that are changing the face of IT: mobile technology, business analytics, cloud computing a… First seen on http: Jump to article: www.infosecurity-magazine.com//view/29697/skills-and-security-are-the-biggest-barriers-to-successful-business/
-
Partner Award für Symantec-Partner: Symantec startet neue Mobility-Programme
Tags: mobileMit zwei neuen Programmen treibt Symantec mobile IT-Lösungen voran. Das »App Center Ready Program« hilft bei der schnellen Entwicklung sicherer Enter… First seen on http: Jump to article: www.crn.de/security/artikel-97569.html
-
Triton Mobile Security: Websense Sicherheits-Lösung wird mobil
Tags: mobileFirst seen on http: Jump to article: www.crn.de/security/artikel-94590.html
-
Prognose von Websense: Diese Cyber-Attacken drohen 2013
Schadhafte mobile Apps, staatlich geförderte Angriffe und ein Comeback bösartiger E-Mails sind nur einige der Cyber-Bedrohungen, die im kommenden Jahr… First seen on http: Jump to article: www.crn.de/security/artikel-97571.html
-
Twitter, Facebook affected by SMS spoofing flaw
Attackers could have mimicked users of Twitter and Facebook, as well as a mobile payments service, if they sent text messages to their accounts using … First seen on http: Jump to article: www.scmagazine.com/twitter-facebook-affected-by-sms-spoofing-flaw/article/271144/
-
Wireless LAN platform for mobile application delivery
Tags: mobileFirst seen on http: Jump to article: net-security.org/secworld.php
-
Orange Invests in Lookout Mobile Security: With Android malware on the rise, consumers are becoming more aware o…
First seen on http: Jump to article: bit.ly/Yud96n
-
[Video] Cracking the Code of Mobile Application
Tags: mobileTitle: Cracking the Code of Mobile ApplicationAbstractLearn how any Mobile Expert aims to crack the application open. While testing / reviewing Androi… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/XtRM_S_9Dno/6313
-
Mobile, APTs and apps top IT security concerns for 2013
As they take stock of their endpoint vulnerability moving into 2013, IT departments are dealing with the flood of mobile devices entering their corpor… First seen on http: Jump to article: www.infosecurity-magazine.com//view/29637/mobile-apts-and-apps-top-it-security-concerns-for-2013/
-
Facebook Photo Sync: Nine things you should know
Facebook has introduced a new feature for iPhone, iPad and Android users which means you can automatically sync any photos you take on your mobile dev… First seen on http: Jump to article: feedproxy.google.com/~r/nakedsecurity/~3/HwiazW6bWUk/
-
Phone users worry about security, but won’t pay for it
A survey of more than 1000 UK mobile phone users shows that while they are concerned about the security of their phones, they believe that they alread… First seen on http: Jump to article: www.infosecurity-magazine.com//view/29624/phone-users-worry-about-security-but-wont-pay-for-it/
-
Mobile Browsers Can Be Used to Exploit Cloud Server Reveal Researchers
Researchers believe exploit could enable a cybercriminal to anonymously run such heavily computational chores as password or digital certificate crack… First seen on http: Jump to article: www.computerworld.in/news/mobile-browsers-can-be-used-exploit-cloud-server-reveal-researchers-46012012
-
RIM macht Mobile Fusion Management fit für BlackBerry 10
Der Hersteller Research in Motion hat eine neue Version der mobilen Verwaltungs-Software BlackBerry Mobile Fusion 6 vorgestellt. Damit erweitert RIM a… First seen on http: Jump to article: www.silicon.de/41576471/rim-mach-mobile-fusion-management-fit-fur-blackberry-10/
-
Mobile communications hub with embedded encryption
First seen on http: Jump to article: net-security.org/secworld.php
-
Phony T-Mobile, Vodaphone Notifications Duping U.K. Users
Cybercriminals in the United Kingdom this week have launched two separate but similar scams intent on gaining access to users’ computers. Both … First seen on http: Jump to article: threatpost.com/en_us/blogs/malicious-browser-add-guides-victims-phishing-sites-112912
-
Mobile and cloud developments will dominate 2013
First seen on http: Jump to article: net-security.org/secworld.php
-
Hardware based malware steals contacts from all mobile platforms using only the Audio Jack!
Indian Security Research Atul Alex presented his surprise paper at the International Malware Conference, MalC… First seen on http: Jump to article: http://thehackernews.com/2012/11/hardware-based-malware-steals-contacts.html
-
Imation releases PC on a Stick mobile workspace
Tags: mobileFirst seen on http: Jump to article: net-security.org/secworld.php
-
Norton Mobile Security adds protection for iOS
Tags: mobileFirst seen on http: Jump to article: net-security.org/secworld.php
-
Facebook testing auto iOS photo uploads for some mobile users: Facebook is testing automatic photo uploading on …
Tags: mobileFirst seen on http: Jump to article: bit.ly/10kLdPK
-
OpenDNS Goes Mobile
Tags: mobileFirst seen on http: Jump to article: darkreading.com/mobile-security/167901113/security/news/240142186/opendns-goes-mobile.html
-
[Video] Mobile Exploit Intelligence Project
As organizations look to deploy larger numbers of mobile devices this year, there is widespread disagreement over which platforms are more secure, wha… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/v1kc8GanLTc/6164
-
[Video] BYOD (Bring your own device)
Tags: mobileA lot of companies let employees bring their own devices, like mobiles to connect to work and be more productive at less cost – but how do you manage … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/nn8c-yURaiU/6180
-
Mobile spam is impacting most U.S. adults
First seen on http: Jump to article: net-security.org/secworld.php
-
When Cloud Met Mobile
First seen on http: Jump to article: darkreading.com/blog/240134936/when-cloud-met-mobile.html
-
Employees, IT Disagree Over Level of Mobile Security Controls
First seen on http: Jump to article: t.co/KChG8GC4
-
Blue Coat releases Mobile Device Security service
First seen on http: Jump to article: net-security.org/secworld.php
-
5 Ways Small Businesses Can Improve Mobile Device Security
Tags: mobileFirst seen on http: Jump to article: darkreading.com/smb-security/167901073/security/news/240128146/5-ways-small-businesses-can-improve-mobile-device-security.html
-
Worlds Are Colliding – When Cloud Met Mobile
First seen on http: Jump to article: darkreading.com/blog/240134936/worlds-are-colliding-when-cloud-met-mobile.html

