Before flocking to a mobile policy in which employees are permitted to connect their smartphones and tablets to the corporate network, consider that the return on investment may not be all it is cracked up to be -- security being a big reason why.
With the holidays right around the corner, expect many workers to soon be returning from their breaks with shiny new personal devices, like an iPad, in hand -- and wanting to connect them to the corporate network. IT departments must have a response plan in place.
Apple on Friday issued an update for its iOS mobile operating system, addressing a security flaw being used to jailbreak iPad, iPhone and iPod Touch devices.
Apple on Thursday said it is working to fix a security flaw in its iOS mobile operating system that soon could be used by criminals to gain access to users' devices.
A new, web-based jailbreaking tool available for the iPad 2 leverages a vulnerability in the way Apple's mobile operating system, iOS, handles PDF files.
A San Francisco man who was charged with exploiting a flaw on the AT&T website to obtain personal information about Apple iPad subscribers has pleaded guilty, prosecutors said Thursday.
Apple this week issued an update to address rampant concerns that its iPhone and iPad devices are collecting and storing information about users' locations.
Apple has denied logging users' locations and promised to release a software update to change the way it stores data on iPhones.
Google and Apple are facing heat from U.S. and foreign lawmakers over the discovery that their smartphone and tablet devices are collecting and storing information about users' locations.
Anonymous location data being collected off smartphones is nothing new, but some privacy experts worry about the implication if law enforcement wants access to it.
Apple released a number of security updates for Mac OS X, Safari and iOS.
The rapid shift in technology requires a major re-think of how we deploy security.
Will 2011 be the year that threats against Mac platforms and devices finally reach the tipping point? Yes, according to a number of security firms.
As Apple devices gain more traction in the office, IT administrators must follow best practices to ensure these endpoints can be trusted.
Users may soon be able to run Flash within an app on an iPhone or iPad.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- British Airways says rewards accounts hacked, locked down
- IBM will invest $3 billion in new IoT unit
- Wake up! What are you doing to battle breach fatigue?
- Obama orders new sanctions program to deter foreign cyber attackers
- 'Volatile Cedar' APT group spies on enterprises, focusing on Lebanese companies
- Orgs need to share info, crave more board oversight, study says
- Human error cited as leading contributor to breaches, study shows