Employees are more mobile than ever and are using their own devices to access corporate data, making mobile security one of the biggest challenges for IT security teams. We keep you up to date on the technology and best practices that can keep corporate data safe in that most vulnerable of places – on an employee's smartphone.
2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.
Google ends 2017 the same way it began the year, by patching media framework flaws.
The vulnerability and phishing attack should both be easy to resolve -- but they're thriving.
Three weeks after critical WiiFi vulnerability was first publicly disclosed, Android at long last gets a patch.
The company's Direct Autonomous Authentication technology allows smartphone users to securely access services and other compatible devices without a separate download.
Months after Broadpwn bug, another set of critical cross-operating system Wi-Fi flaws has been patched.
Enterprise mobility management (EMM) is a sophisticated technology for controlling mobile access to data and networks. We review five of the top EMM solutions.
The exploit, which requires no user interaction, can give the attacker control of the affected device.