BYOD

The Dark Side of BYOD

The BYOD trend offers pluses for both employers and employees, but sometimes there's a hitch. Under certain circumstances, the owner of a device suddenly might lose all of the data stored on it. Clients of Fiberlink remotely wiped 81,000 mobile devices between January and June. About 30,000 were cle...

Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this week told an audience at the Black Hat security conference in Las Vegas that Android, BlackBerry and some iOS devices are vulnerable. The problem lies in a device ...

The news that Apple and IBM have joined forces sent a shockwave through the Apple-focused world this week, and I admit it, I was surprised. At first glance, the deal seems to be this big group hug with the two companies becoming inextricably entwined. Yeah, it's not that. In fact, this is the bigges...

Doing a factory reset to wipe the data off smartphones does not work, and the data can be recovered, warned Avast. The company recovered tons of data, including more than 40,000 stored photographs, from 20 used Android phones purchased from eBay. Device owners need to overwrite their files to make t...

SPOTLIGHT ON SECURITY

Cupid Fires Arrow at OpenSSL’s Heart

As if the discovery of the Heartbleed flaw weren't enough woe for OpenSSL, more than half a dozen additional defects have been discovered in the code used to protect communication on the Web. Among them is one dubbed "Cupid" by its discoverers. The flaw can be used to compromise enterprise networks....

Salesforce.com has announced that its Salesforce1 Mobile App will be generally available in the company's summer release. The app will be accompanied by an enterprise ecosystem consisting of some 65 partner apps, a new connector for SAP, and a slew of new features around sales, service and marketing...

SPOTLIGHT ON SECURITY

Security Firms Scour Mobile Apps

Security pros weren't very kind to mobile applications last week. Several firms knocked apps produced for the smartphone market for all kinds of risky behaviors that could lead to trouble not only for mobile device owners, but also for their employers. Android has been a poster child for misbehavi...

We have met the enemy and he is us. Pogo's philosophical observation perfectly describes the way IT and security professionals view their end users' attitude toward data security. An overwhelming 80 percent of corporate security professionals and IT administrators indicated in a recent survey that "...

What should be the minimum legal age to access social media platforms?
Loading ... Loading ...