ITworld Security http://www.itworld.com/taxonomy/term/49/all en Russian SMS Trojan for Android hits US, dozens of other countries http://www.itworld.com/security/415872/russian-sms-trojan-android-hits-us-dozens-other-countries An Android Trojan app that sends SMS messages to premium-rate numbers has expanded globally over the past year, racking up bills for users in over 60 countries including the U.S., malware researchers from Kaspersky Lab said.<p><a href="http://www.itworld.com/security/415872/russian-sms-trojan-android-hits-us-dozens-other-countries" target="_blank">read more</a></p> http://www.itworld.com/security/415872/russian-sms-trojan-android-hits-us-dozens-other-countries#comments Security News Wed, 23 Apr 2014 18:32:00 +0000 IDGNS staff 415872 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com Enterprise Mobility Management: A Data Security Checklist http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist <!--paging_filter--><p> This document presents a checklist of features organizations should review when evaluating a data security solution as part of an enterprise mobility management strategy.</p> <p><a href="http://www.itworld.com/mobile-wireless/415824/enterprise-mobility-management-data-security-checklist" target="_blank">read more</a></p> Mobile & Wireless Security Wed, 23 Apr 2014 17:00:37 +0000 415824 at http://www.itworld.com