Mobile

Making a Case for Mobile Device Management

  Historically, the push for IT changes came from top-level executives and organizations provided employees with high-end computers that were well beyond the tech...

What Star Wars Teaches Us About BYOD and IT Security

TORONTO - For the last 35 years, Star Wars has been the cornerstone of mainstream and geek cultural awareness. While Star Wars is a piece of dramatic fiction, many have found inspiration and solace ...

Full Disk Encryption Buyer’s Guide

Full disk encryption - also known as whole encryption - is the most effective way to prevent confidential data being taken from a laptop that has been lost, stolen or left ...

4 Steps to Securing Mobile Devices and Apps in the Workplace

It's an unstoppable trend: Employees are bringing their own iPhones, iPads, and Android devices to work and using them for business purposes. While that may be great for pr...

Google Wallet Compromised with Hackers Access to PIN & Funds

What would happen if you lost your wallet to a thief? It's a question that Google Wallet users on Android phones are asking themselves in the wake of multiple reports of sec...

iOS vs Android Security: Which One Is More Secure?

Just when you thought the evidence was dramatic -- overwhelming perhaps -- that Apple's iOS offers vastly more mobile security than does Google's Android, the wall of confid...

8 iOS Security Apps for Jailbroken Devices

Due to the iOS design, there are a limited number of security apps in the Mac App Store. However, jailbreaking your iPhone, iPad, or iPod Touch gives apps more control of i...

Tools to Deploy 802.1X on Mobile Devices

Deploying WPA2-Enterprise security with 802.1X authentication across your Wi-Fi network of PCs is already quite a task. Adding in support of all the mobile phones and tablets makes it even more daun...

How to Erase Your iOS Device

Security shouldn't stop at your computer. Your mobile phones and devices are actually more vulnerable to become lost or stolen, and they can contain just as much personal an...

The Caffe Latte Attack: How It Works — and How to Block It

The flaws that make WEP vulnerable were documented back in 2001, prompting development of dozens of cracking tools. Until recently, those attacks focused on traffic captured from active networks...

Latest articles