Wireless / Mobile Security News, Features, and Interviews


Knowledge is power in the cybersecurity war

​Every breach, whether it’s a Distributed Denial of Service (DDoS) attack, hack of a corporate database or phishing attack starts in the same place. An endpoint device is accessed and used by an unauthorised party or a user is coerced into using that endpoint in an unintended way.

Anthony Caruana | 06 Dec | Read more

As holiday gift splurge looms, gadget-loving Australians still failing on device, Wi-Fi protection

Connected gadgets are sure to show up under Christmas trees next month but Australians are still well behind the curve when it comes to securing them, one technologist has warned as new survey results suggest that many users still can’t pick out a phishing email – and that 4 in 5 users have no idea their home Wi-Fi networks have the potential to be compromised.

David Braue | 24 Nov | Read more

More Wireless / Mobile Security news


More Wireless / Mobile Security slideshows


2011's biggest security snafus

Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.

Ellen Messmer | 02 Dec | Read more

Security breach

No company wants to be associated with a data breach, but if your systems are compromised the fallout can sometimes be more damaging than the act itself.

Matt Rodgers | 22 Sep | Read more

NEWS FEATURE: Debate rages over how to manage personal mobile devices used for work

Increasingly, businesses accept the idea that employees should be able to <a href="http://www.networkworld.com/columnists/2011/072711-andreas.html?hpg1=bn">use their personal mobile devices</a>, such as <a href="http://www.networkworld.com/slideshows/2010/061510-smartphone-history.html">smartphones</a> and tablets, for work. But debate is raging as to whether these employee-owned devices should be <a href="http://www.networkworld.com/news/2011/061511-smartphones-tablets-security.html">managed and secured</a> exactly as corporate-owned devices might be.

Ellen Messmer | 28 Jul | Read more

More Wireless / Mobile Security features


More Wireless / Mobile Security opinons

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place