Any organization that operates a mobile work policy, whether that's through a Bring Your Own Device (BYOD) or company owned device approach, must consider...
Hi, what are you looking for?
Any organization that operates a mobile work policy, whether that's through a Bring Your Own Device (BYOD) or company owned device approach, must consider...
Sophos "Intercept X" Endpoint Security Integrates Next Generation Anti-Exploit and Anti-Ransomware Technology
A new report from McAfee Labs shows that while malware overall continues to increase, web-based threats and Mac OS malware have declined in recent...
Symantec on Tuesday launched its new Symantec Endpoint Protection Cloud (SEPC) security solution designed to marry old and new endpoint technologies in a single...
UnifyID Uses Machine Learning and Behavioral Characteristics to Authenticate Users
There is a current extortion campaign that seems particularly focused in the UK. The threat is to deliver a DDoS attack together with ransomware...
Hitsniffer's Downfall Highlights IP Problems over Code Ownership
HSBC bank has become the latest financial institution to adopt smartphone-based biometrics as a form of user authentication. Institutions already doing so include MasterCard...
Google has signed up for the EU/U.S. Privacy Shield, which provides a set of enforceable protections for the personal data of EU individuals.
When LeakedSource yesterday disclosed the account details of 43 million account details stolen from Last.fm in 2012, it commented that it was processing enough...
Smartphone malware infections increased by 96% over the year to April 2016; smartphones account for 78% of all mobile infections; and the number of...
In a private letter to its members on Tuesday, SWIFT has disclosed that additional cyber attacks have surfaced since its last update in June.