November 01, 2012
No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.
The breach compromised the personal information of about 27,000 patients at Blount Memorial Hospital in Maryville, Tenn.
TD Bank has begun notifying customers that it lost two backup computer tapes containing their personal information
Rapid7, a Boston-based vulnerability management and penetration testing company, has acquired Seattle start-up Mobilisafe, which makes cloud-based mobile risk management technology.
The vulnerability, which affects various Galaxy models, could allow an attacker to initiate a factory reset on phones, remotely wiping them, if they are able to trick a victim into visiting a malicious web page.
If you thought malware installation networks were big business in the PC realm, mobile fraudsters are earning up to 10 times as much to infect Android devices.
Researchers at security firm Cloudmark have seen a 913 percent increase in daily SMS phishing reports.
Security firm McAfee said it's amassed 1.5 million more malware samples in the second quarter of this year compared to the first quarter.
The best practices ask developers to weigh the privacy and security risks before rolling out apps to employees and customers.
Admitting to the vulnerability, Apple is suggesting that users employ iMessage as a workaround.
The computer theft marks the second breach of patient data in a year at Stanford Hospital.
A USB drive with data on 14,300 patients of Oregon Health & Science University in Portland was stolen from the home of an employee on July 4 or 5.
An unencrypted laptop containing the personal data of roughly 10,000 medical patients was stolen from a hospital vendor employee's home.
August 01, 2012
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?
July 30, 2012
While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had to alleviate engorged traffic on its network, while safeguarding data.
July 26, 2012
The computing giant's first-ever foray into speaking at Black Hat about its security didn't reveal much more than what already was known.
A faulty Yahoo Mail application available on Android devices may be the cause of spam messages that have turned up and appear to be sent from mobile phones.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
An unencrypted laptop containing patient data was stolen in late April from the home of a doctor working for The University of Texas M.D. Anderson Cancer Center.
June 27, 2012
This featured article is a sample of our "Mobile Spotlight" issue and discusses mobile apps in the enterprise and how employees downloading them is cause for concern for IT departments.
Users of Apple's new mobile operating system, set for final release in the fall, will now be able to grant or deny apps from accessing personal data.
June 01, 2012
Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army
The body that manages debit and credit card security standards on Wednesday released best practices for retailers wishing to accept payments via mobile devices.
May 15, 2012
Before flocking to a mobile policy in which employees are permitted to connect their smartphones and tablets to the corporate network, consider that the return on investment may not be all it is cracked up to be -- security being a big reason why.
A difficult-to-find vulnerability, disclosed in March at Google's inaugural hacker competition, was among the iOS fixes.
Mobile virus authors have adopted another tactic from their PC-sabotaging counterparts: infecting websites to spread their wares.
Letters have gone out to patients of Howard University Hospital in Washington, D.C., after their personal information was exposed when a laptop was stolen from the car of a contractor.
March 22, 2012
Enterprises are being exposed to multiple operating systems, models and operators - requiring IT teams to support the safe deployment of personal devices used for work purposes.
Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.