Mobile

IBM Warns of Surge in Mobile Malware

In a recent report (PDF file), IBM X-Force security researchers warned that malware targeting mobile devices is on the rise."The study said the bring-your-own-device (BYOD)...

Look Out: Your Android Is Leaking

The headlines in mid-May had to frighten just about every Android user: “Androids Leaking Personal Data,” the stories shrieked, and the reports -- based on research out of the University of Ulm in G...

How to Erase Your iOS Device

Security shouldn't stop at your computer. Your mobile phones and devices are actually more vulnerable to become lost or stolen, and they can contain just as much personal an...

How to: Protect Yourself at Public Wi-Fi Hotspots

There are, of course, privacy and security risks involved in using Wi-Fi on public wireless networks, such as the hotspots found in many airports or cafes. While the conveni...

The Caffe Latte Attack: How It Works — and How to Block It

The flaws that make WEP vulnerable were documented back in 2001, prompting development of dozens of cracking tools. Until recently, those attacks focused on traffic captured from active networks, re...

Email Administrator Best Practices

With last week’s release of a new set of “Best Common Practices”(BCP), the gurus of the anti-spam and anti-phishing world have given everybody who runs email systems a handy list of chores, just in ...

Latest articles