
iPhone encryption is six years ahead of Android: cryptographer
An analysis of the encryption Google Android 7.0 Nougat could explain why US law enforcement is so concerned about Apple’s iPhone.
An analysis of the encryption Google Android 7.0 Nougat could explain why US law enforcement is so concerned about Apple’s iPhone.
Devices running Google's Android operating system have dethroned Apple's iPhones and iPads as the biggest drivers of worldwide mobile ad traffic, according to a new study from Opera Mediaworks.
The latest major version of Android, known as Jelly Bean, is now the most widely used variant of the platform, according to new statistics from Google.
In an alarming 'post-PC' era alert, working group says criminal infrastructure created much faster than it was for PC fraud
John P. Mello | 16 May | Read more
It's the busy time of year for Allrecipes.com, which gets 700 million visitors annually, and to accommodate the surge of recipe-seekers, it's necessary to cook up some serious network changes in the data center.
Ellen Messmer | 19 Dec | Read more
The London-based firm Trustonic made its official debut today to provide crypto-based technology for use in chips for a wide variety of purposes, including enterprise security such as VPNs, mobile-device security, payment services, and control over how content can be delivered for entertainment.
Ellen Messmer | 18 Dec | Read more
One-quarter of more than 400,000 Android apps examined in the Google Play store pose security risks to mobile-device users, according to new research.
Ellen Messmer | 01 Nov | Read more
Don't fear the "bring your own device" (BYOD) trend -- take a chance and find out if it works in your organization, say IT managers in the financial industry that let employees make use of their personal smartphones and tablets for work.
Ellen Messmer | 22 Oct | Read more
Which <a href="http://www.networkworld.com/news/2011/102011-tech-arguments-corporate-employee-mobile-devices-252229.html">smartphones</a> pose the biggest <a href="http://www.networkworld.com/topics/security.html">security</a> and privacy risks to consumers and corporations?
Ellen Messmer | 21 Nov | Read more
I'm a fan of being secure, so naturally I decided to turn on two-factor authentication for my Google account.
Rohan Pearce | 17 Nov | Read more
Symbian and Microsoft Windows Mobile platforms have been the proving ground for mobile malware over the past five years, but a new Juniper Networks report states that Google Android now takes "the crown" as the platform getting the most attention from malware developers.
Ellen Messmer | 11 May | Read more
Google's Android Market mobile software shop was hit last week with its first major malware attack.
A computer security researcher says he plans to release code Thursday that could be used to attack some versions of Google's Android phones over the Internet.
Robert McMillan | 05 Nov | Read more
Why nation-state attacks are everyone’s problem
Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.
According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities