- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- How to keep your smartphone (and its data) secure
- Espionage outpacing financial crime as better reporting improves security picture: Verizon
- Today's Approach to Security is Broken
- Web apps and point-of-sale were leading hacker targets in 2013, says Verizon
BlackBerry today released an update to its BlackBerry Enterprise Service (BES) 10 software designed to address a "Heartbleed"-related OpenSSL vulnerability in the version of Apache Tomcat used within the BES BlackBerry Work Connect Notification Service. (A detailed breakdown of the vulnerability is available on NIST.gov.)
If something about iOS 7.1 just didn't sit right for you, no worries: Here comes iOS 7.1.1 to give it another shot.
A malware campaign of yet-to-be-determined origin is infecting jailbroken iPhones and iPads to steal Apple account credentials from SSL encrypted traffic.
The kill switch application wireless carriers and device manufacturers plan to make available next year for new smartphones could benefit small businesses on a tight budget, an expert says.
Telecom operator Telefónica has launched the first mobile ad-exchange platform to use the operator's customer demographics and real-time location data to serve targeted mobile ads, the company said on Wednesday.
With millions of new iOS and Android devices pouring into the enterprise every quarter, it's important to know just how much risk these devices bring - and if one mobile operating system has an edge over another when it comes to securing enterprise applications and data.
Computerworld Hong Kong took an in-depth look at the top ten events that shook the local and global IT world in 2013.
In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
As 2012 draws to a close, Ericsson ConsumerLab has identified the hottest consumer trends for 2013 and beyond. For more than 15 years, ConsumerLab has conducted research into people's values, behavior and ways of using ICT products and services.
Whitepapers about mobile
Many firms are acutely aware of the risks associated with lost or unrecoverable data on employee devices, including desktops, laptops and mobile devices. Companies simply cannot overlook the consequences of public exposure that would likely result if sensitive data is lost, stolen, compromised or cannot be located. This white paper explores the challenges associated with safeguarding data and opening up universal access for distributed desktop and laptop systems residing at the edge of an organization's IT infrastructure.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.