Application Security January 12, 2017 Protecting Your Staff in Co-Working Spaces 2 min read - Co-working spaces can help companies maximize productivity, but they can also introduce security concerns if employees are not trained to connect securely.
Endpoint January 9, 2017 Bearing Fruit: The Future of Mobile Technology as Apple’s iPhone Turns 10 4 min read - Mobile technology buffs and analysts are hoping Apple will revolutionize the smartphone market once again 10 years after it released the first iPhone.
Endpoint December 29, 2016 BYOD Risks: Should Account Lockout Be Used After Failed Logins? 2 min read - For companies with a bring-your-own-device policy, IT managers should create security requirements that address BYOD risks without denting productivity.
Endpoint December 28, 2016 Avoiding the Technology Upgrade? Don’t Dodge Security 4 min read - Consumers are buying new devices at a slow rate, but users who avoid the latest technology upgrade risk missing out on critical security updates.
Endpoint December 21, 2016 The BYOD Policy Holiday Challenge 2 min read - Many employees are sure to return to work after the holiday with brand new mobile devices, creating a variety of BYOD policy challenges for IT managers.
December 6, 2016 Mobile Security News Roundup: Top Stories From November 2 min read - November's mobile security news roundup covers iCloud insecurity, holiday shopping hazards, Android issues involving plugin Trojans and ad fraud malware.
December 5, 2016 A Software Attempt to Mitigate Rowhammer Attacks 2 min read - German researchers developed two methods for mitigating Rowhammer attacks, which exploit the physical hardware in dynamic random-access memory (DRAM).
Risk Management November 23, 2016 Travel Security Tips for Personal and Business Trips 4 min read - Before leaving for a business trip, be sure to keep these basic travel security tips in mind to keep your data safe from local adversaries.
November 15, 2016 WindTalker: Breezy Burglars Steal Passwords With Wi-Fi Dupe 2 min read - The WindTalker exploit enables fraudsters to deduce smartphone passwords and PINs over public Wi-Fi by analyzing changes in CSI.
November 9, 2016 Exaspy Spyware Is Available as a Service 2 min read - Exaspy spyware, which infects Android phones to intercept text messages, emails and other communications, is available as a commodity service online.