The exploit, which requires no user interaction, can give the attacker control of the affected device.
Once again, Google's media framework is home to the bulk of the patched issues.
Virtual private networks (VPNs) come with many different protocols and features, so choosing the best one for your organization requires some research. We outline your options.
Comodo’s Advanced Endpoint Protection (AEP) brings AI-powered analysis and a default-deny containment approach to the enterprise.
Android June update and Chrome 59 provide fixes for security flaws.
The company's latest update to its TrulySecure biometrics technology includes advanced deep learning algorithms that are tougher to trick.
The attackers were able to redirect SMS messages used for two-factor authentication in order to approve money transfers.
Google is out with its fifth patch update of 2017, with mediaserver flaws once again topping the list.
And 51 percent believe the risk of mobile data loss is equal to or greater than that for PCs, a recent survey found.
In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.
When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.
Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).
The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.
Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.
The OS is in use on a wide range of devices, including Galaxy Gear smartwatches and Z1, Z2 and Z3 phones.
More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.
Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.