The first privacy-driven mobile device is shipping to pre-order customers now and will begin accepting additional orders later this year.
An organizing solution was found to manage mobile devices being used in Florida's Hillsborough School District, reports Greg Masters.
No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.
The breach compromised the personal information of about 27,000 patients at Blount Memorial Hospital in Maryville, Tenn.
TD Bank has begun notifying customers that it lost two backup computer tapes containing their personal information
Rapid7, a Boston-based vulnerability management and penetration testing company, has acquired Seattle start-up Mobilisafe, which makes cloud-based mobile risk management technology.
The vulnerability, which affects various Galaxy models, could allow an attacker to initiate a factory reset on phones, remotely wiping them, if they are able to trick a victim into visiting a malicious web page.
Researchers at security firm Cloudmark have seen a 913 percent increase in daily SMS phishing reports.
Security firm McAfee said it's amassed 1.5 million more malware samples in the second quarter of this year compared to the first quarter.
The best practices ask developers to weigh the privacy and security risks before rolling out apps to employees and customers.
Admitting to the vulnerability, Apple is suggesting that users employ iMessage as a workaround.
A USB drive with data on 14,300 patients of Oregon Health & Science University in Portland was stolen from the home of an employee on July 4 or 5.
An unencrypted laptop containing the personal data of roughly 10,000 medical patients was stolen from a hospital vendor employee's home.
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?
The computing giant's first-ever foray into speaking at Black Hat about its security didn't reveal much more than what already was known.
A faulty Yahoo Mail application available on Android devices may be the cause of spam messages that have turned up and appear to be sent from mobile phones.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
An unencrypted laptop containing patient data was stolen in late April from the home of a doctor working for The University of Texas M.D. Anderson Cancer Center.
This featured article is a sample of our "Mobile Spotlight" issue and discusses mobile apps in the enterprise and how employees downloading them is cause for concern for IT departments.
Users of Apple's new mobile operating system, set for final release in the fall, will now be able to grant or deny apps from accessing personal data.
One of the hottest topics in the security industry revolves around employee-owned devices in the workplace, aka bring-your-own-device.
Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army
The body that manages debit and credit card security standards on Wednesday released best practices for retailers wishing to accept payments via mobile devices.
Before flocking to a mobile policy in which employees are permitted to connect their smartphones and tablets to the corporate network, consider that the return on investment may not be all it is cracked up to be -- security being a big reason why.
A difficult-to-find vulnerability, disclosed in March at Google's inaugural hacker competition, was among the iOS fixes.
Letters have gone out to patients of Howard University Hospital in Washington, D.C., after their personal information was exposed when a laptop was stolen from the car of a contractor.
Enterprises are being exposed to multiple operating systems, models and operators - requiring IT teams to support the safe deployment of personal devices used for work purposes.
Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.
The exploding use of smart mobile devices and the business productivity that accompanies this trend has many CIOs and IT administrators reeling.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure