You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 4 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

News remove
Last 30 days remove

Your search for mobile device management/ returned 4 results

Sort Results:

Relevant Recent
APTs/cyberespionage, Cloud Security, Coronavirus, Phishing, Security News

COVID-19 accounts for most 2020 cyberattacks

The pandemic has served as a catalyst for much of the hacking increases during the first half of 2020, with weekly COVID-19-related phishing attacks growing from under 5,000 in February to more than 200,000 in late April. All types of cyberattacks were up 34 percent from March to April, according to Check Point’s mid-year report.…
Cybercrime, Data leakage prevention (DLP), Ransomware, Security News, Website/Web Server Security

Avon attackers may have exploited unprotected web server

An openly accessible web server has emerged as a possible attack vector used by cybercriminals in a reported ransomware incident that affected personal care and beauty marketer Avon Products last June. Researchers from Safety Detectives today announced its discovery of a U.S.-based Avon.com server that was not defended by a password, leaving it accessible to…
Government, Government/Defense, Mobile Security, Privacy & Compliance News and Analysis, Security News

Is TikTok out of time? Experts mull implications of ban

Edicts by Wells Fargo, India and the U.S. military forbidding use of popular Chinese video-sharing app TikTok, may portend a national ban and raise questions if such a prohibition would be practical and enforceable, and what the greater implications would be. Owned by Beijing-based internet technology company ByteDance, TikTok has been downloaded more than 2…
IoT, Privacy & Compliance News and Analysis, Security News

Are your fleet’s vehicles leaking your data secrets?

Enterprise CISOs are used to worrying about corporate data leaks via typical mobile, remote locations, IoT and Shadow IT. But what about the vehicles used by so many people who have access to the systems and data you are paid to protect? Although those vehicles technically fall into many of those categories (mobile, remote and…
Next post in Privacy & Compliance News and Analysis