The first privacy-driven mobile device is shipping to pre-order customers now and will begin accepting additional orders later this year.
An organizing solution was found to manage mobile devices being used in Florida's Hillsborough School District, reports Greg Masters.
No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.
The breach compromised the personal information of about 27,000 patients at Blount Memorial Hospital in Maryville, Tenn.
TD Bank has begun notifying customers that it lost two backup computer tapes containing their personal information
Rapid7, a Boston-based vulnerability management and penetration testing company, has acquired Seattle start-up Mobilisafe, which makes cloud-based mobile risk management technology.
The vulnerability, which affects various Galaxy models, could allow an attacker to initiate a factory reset on phones, remotely wiping them, if they are able to trick a victim into visiting a malicious web page.
Researchers at security firm Cloudmark have seen a 913 percent increase in daily SMS phishing reports.
Security firm McAfee said it's amassed 1.5 million more malware samples in the second quarter of this year compared to the first quarter.
The best practices ask developers to weigh the privacy and security risks before rolling out apps to employees and customers.
Admitting to the vulnerability, Apple is suggesting that users employ iMessage as a workaround.
A USB drive with data on 14,300 patients of Oregon Health & Science University in Portland was stolen from the home of an employee on July 4 or 5.
An unencrypted laptop containing the personal data of roughly 10,000 medical patients was stolen from a hospital vendor employee's home.
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?
The computing giant's first-ever foray into speaking at Black Hat about its security didn't reveal much more than what already was known.
A faulty Yahoo Mail application available on Android devices may be the cause of spam messages that have turned up and appear to be sent from mobile phones.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
An unencrypted laptop containing patient data was stolen in late April from the home of a doctor working for The University of Texas M.D. Anderson Cancer Center.
This featured article is a sample of our "Mobile Spotlight" issue and discusses mobile apps in the enterprise and how employees downloading them is cause for concern for IT departments.
Users of Apple's new mobile operating system, set for final release in the fall, will now be able to grant or deny apps from accessing personal data.
One of the hottest topics in the security industry revolves around employee-owned devices in the workplace, aka bring-your-own-device.
Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army
The body that manages debit and credit card security standards on Wednesday released best practices for retailers wishing to accept payments via mobile devices.
Before flocking to a mobile policy in which employees are permitted to connect their smartphones and tablets to the corporate network, consider that the return on investment may not be all it is cracked up to be -- security being a big reason why.
A difficult-to-find vulnerability, disclosed in March at Google's inaugural hacker competition, was among the iOS fixes.
Letters have gone out to patients of Howard University Hospital in Washington, D.C., after their personal information was exposed when a laptop was stolen from the car of a contractor.
Enterprises are being exposed to multiple operating systems, models and operators - requiring IT teams to support the safe deployment of personal devices used for work purposes.
Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.
The exploding use of smart mobile devices and the business productivity that accompanies this trend has many CIOs and IT administrators reeling.
Sign up to our newsletters
SC Magazine Articles
- Malware on Lime Crime website, payment cards compromised
- State breakdowns: Anthem breach by the numbers
- Florida law enforcement docs show widespread stingray use, secrecy
- After Superfish-Lenovo incident, Facebook probes larger issue of SSL-sniffing adware
- Older vulnerabilities a top enabler of breaches, according to report
- Carbanak APT campaign made off with $1B from banks globally
- BMW issues security patch for bug allowing attackers physical access into vehicles
- State breakdowns: Anthem breach by the numbers
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- Researchers investigate link between Axiom spy group, Anthem breach
- Top Android tablets for children riddled with security lapses, study finds
- Bulk Reef Supply website compromised, credit cards at risk
- Medical identity theft up 22 percent in 2014, annual report says
- Report: Majority of health-related websites leak data to third parties