How secure is the fingerprint reader on the iPhone?
Ask a question
mSpy bundles its smartphone monitoring software in four popular smartphones
Some basic security precautions you can take for the wired side of the network, whether you're a small business or a large enterprise.
First browser maker to fix flaws revealed in Pwn2Own hacking contest.
When Microsoft stops supporting Windows XP next month businesses that have to comply with payment card industry (PCI) data security standards as well as health care and financial standards may find themselves out of compliance unless they call in some creative fixes, experts say.
An archive containing transaction records from Mt. Gox that was released on the Internet last week by the hackers who compromised the blog of Mt. Gox CEO Mark Karpeles also contains bitcoin-stealing malware for Windows and Mac.
IBM said it has not provided client data to the U.S. National Security Agency or any other government agency under surveillance programs involving the bulk collection of content or metadata.
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
At around €2,000 (US$2800) each, the secure smartphones that SecuSmart showed at Cebit last year were out of reach of many businesses -- although three governments have since bought them to secure mobile phone calls between senior officials, according to CEO Hans-Christoph Quelle. Now the company has developed a less expensive and more flexible system intended for the enterprise, and has extended the reach of its mobile system to secure VOIP calls on desktop phones.
Using Google's cloud services to process health care records is a serious violation of the U.K.'s data protection act, privacy groups said in a complaint filed with the country's data protection authority.
Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own hacking competition Thursday, racking up total prizes of US$450,000.
White Papers & Webcasts