- Google levels up security at I/O with secure comms tool, better authentication
- New NSA phone dragnet proposals blasted as flawed
- Tor connections to hidden services could be easy to de-anonymize
- How Google took a page from Apple to secure Android Pay
- Elon Musk insider Branden Spikes launches new security firm in UK
mobile security - News, Features, and Slideshows
Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.
, the open source software management company, picks the top 10 open source projects launched in the past year, based on stats collected from the
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them
Three decades into the digital revolution, passwords are still complicated, ineffective and a drain on IT's resources. What gives?
In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then called iPhone OS) were many of the security features that modern-day desktop software has as a matter of course, such as data-execution protection (DEP) and address-space layout randomization (ASLR). Apple's cachet lured security researchers to test the platform, and in less than a month, a trio had released details on the first vulnerability: an exploitable flaw in the mobile Safari browser.
You may already know the basics of Internet security and keeping your personal data private while browsing the Web: Use a firewall, don't open attachments you aren't expecting, and never follow links from strangers. But what about your smartphone? The ease with which security researcher Georgia Weidman was able to infect Android phones with her custom botnet during the 2011 ShmooCon security conference suggests that anyone concerned about the privacy of the personal data stored on their smartphone should think twice before downloading dubious or otherwise untrustworthy apps.
The pace of mobilization within many enterprises is increasing rapidly. Enterprises of all sizes and types are finding that going mobile can significantly increase the productivity of their employees, bringing added flexibility and cost reductions and helping many companies gain a competitive edge in their market.
- Exclusive Group secures new investment to support continued growth strategy
- Avaya awards its top Asia-Pacific channel partners
- A/NZ Shoppers deserting retailers due to online performance issues: Rackspace
- Fujitsu World Tour 2015: A focus on the healthy human side of IoT (+8 photos)
- Avaya finalises Ensa acquisition
- Intel works to end "lost" data center devices
- Microsoft throws open the doors for Cloud Foundry on Azure
- Don't blame free Windows 10 for PC business ills
- Google and Levi's team up on smart clothes
- Google bets that smart fabrics, gesture interfaces will replace fiddling on a tiny wearable touchscreen
- Aon CMO: Employee, executive cultural shift needed for content marketing success
- Shazam launches visual recognition content offering for brands
- Vivid Sydney, Kathmandu and Crown take up Instagram carousel ads
- IBM creates industry-specific predictive analytics as Salesforce unveils big data Wave
- Why GoDaddy needs a CMO and a chief customer officer