- Botnet snatches 2 million logins for Facebook, ADP payroll processor and other sites
- Malware still running rings around security tools, eThreatz testing finds
- 2 million stolen login credentials discovered for Facebook, Google, LinkedIn, Twitter, other sites
- Fake-police ransomware reaches Australia
- Retailers tracking customers via Wi-Fi suggests that privacy really is dead
The developer of a popular flashlight app for Android devices has agreed to settle U.S. Federal Trade Commission charges that it shared users' geolocation information with advertising networks and other organizations without permission.
The U.S. is collecting nearly 5 billion records a day on the location of cellphones around the world to feed a large database of the location of "at least hundreds of millions of devices," according to a newspaper report.
Online shopping trends point to lots of people, particularly men, using their smartphones and tablets to buy holiday presents. Since some of that browsing and buying will occur at work, experts say companies would be wise to give employees the following eight tips to protect themselves and corporate data.
Being able to lock your mobile device is important because, in many cases, it's your first line of defense. It may not be the strongest form of security -- in fact, it's arguably the weakest -- but it could prove to be the difference in protecting your organization by keeping the device locked down until mobile device management measures like remote wiping are put into play.
The U.S. Federal Communications Commission has released a smartphone app that will allow users to measure the speed of their mobile broadband connection, while providing aggregate data to the agency for measuring nationwide mobile broadband network performance.
In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
As 2012 draws to a close, Ericsson ConsumerLab has identified the hottest consumer trends for 2013 and beyond. For more than 15 years, ConsumerLab has conducted research into people's values, behavior and ways of using ICT products and services.
Two hotels in Hong Kong are leveraging mobile apps to give guests a new experience during their stay.
These days, it is almost impossible to meet someone who doesn't own a cell phone. More specifically, smartphones, whether it be the trendy iPhone, corporate favored Blackberry or modern Windows Mobile, almost everyone has joined the smartphone frenzy -- and with good reason. A smartphone offers more advanced computing ability and connectivity than a contemporary phone.
Whitepapers about mobile
Many firms are acutely aware of the risks associated with lost or unrecoverable data on employee devices, including desktops, laptops and mobile devices. Companies simply cannot overlook the consequences of public exposure that would likely result if sensitive data is lost, stolen, compromised or cannot be located. This white paper explores the challenges associated with safeguarding data and opening up universal access for distributed desktop and laptop systems residing at the edge of an organization's IT infrastructure.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.