Mobile Endpoint Security
Securing the device is only the first step in reducing the risk of mobile employees says Eldar Tuvey, noting we need to secure and monitor both the hardware and the endpoint activity and implement a multi-level approach.
Identity, payment and security need to become seamless and inherently more secure in themselves than anything we currently use for mobile identity, says Nick Barth.
Spanish giant enters the crowded mobile digital security space with range of products and services.
Computer security researchers say they have cracked the encryption algorithm used to protect most cell phone communications, potentially allowing attackers to listen in on the calls of billions of individuals.
Virus researchers have spotted a new variant of a Mac trojan that attempts to change a victim computer's DNS settings.
The Cligs URL shortening site was hacked during the weekend to cause 2.2 million links to redirect to the same site.
A new worm targeting mobile devices running Nokia's Symbian OS is spreading in China in a unique way: through malicious links contained in text messages.
Apple, whose market share is growing among computer users, is now recommending that consumers consider applying anti-virus protection to their machines.
The second version of the iPhone, released Friday, includes faster internet, GPS functionality and an application store — as well as 13 security fixes.
Sun Microsystems has issued fixes for a number of vulnerabilities in its Java offerings, while six flaws in Apple TV were patched.
The abundance of voice over IP equipment has led researchers to develop a range of techniques which, instead of hiding information in standard data traffic, will allow individuals to instead hide information in VoIP streams
The threat which could have led to the country's BlackBerry services being suspended appears to have lifted after the Government backed down on its own demands for access to users' data
Terminals such as those found in vending machines and on fuel pumps are to be included in additional guidelines to be written by the PCI Security Standards Council, producing extra demands on retailers
Taylor Woodrow, one of the UK's largest construction companies, is to give all its staff access to Google Apps, backed by the internet giant's security products
PwC chairman Kieran Poynter, the man tasked to investigate what happened in the catastrophic HMRC data breach, has revealed that significant progress has been made since the disastrous information leakage last October
The SFO invited SC Magazine for a sneak preview of its recently revamped digital forensics unit, where scientists were hard at work dissecting and interrogating the latest mobile devices
Newcastle Hospitals NHS Foundation Trust is tieing together its building and computing access systems to vastly simplify its operations
Security lecturers from a leading Netherlands university travelled to London last week to crack the Oyster smart card, clone it and get a free day's travel, while they pursue an open source alternative
The security company has released a free beta version of a software product which aims to prevent malware from infecting Windows Mobile devices
The software vendor has unveiled its new approach to internet security, which means transferring the workload off individual PCs and into the internet
The manufacturer of the BlackBerry devices is standing firm against Indian Government demands for access to users' data and it is convinced threats to shut down the service in the country won't come to fruition
British businesses are finding that protecting their organisations from hackers, social networking threats and browser vulnerabilities is an increasing struggle, according to research
AVG, BitDefender, Kaspersky and Sophos are making inroads into the market share of the endpoint industry leaders, largely on the grounds of using less processing power, a leading analyst argued today
The security vendor has released version 5.0 of its WorryFree range, while adding a new product to try to secure online retailers in the fight against credit card thieves
India's Department of Telecom has threatened a total shutdown of the country's BlackBerry services if the device's manufacturer RIM does not give it access to users' emails, according to local reports
Hackers could run malicious code on the RAZR device by sending a corrupt image by MMS, according to an advisory from TippingPoint
The company is to bring to market next month a GPS and 3G enabled datacard which should give IT administrators 24/7 visibility of users' mobile devices
Symantec will acquire enterprise management software provider Altiris, the two companies announced today.
Apple has patched a flaw in AirPort Extreme that was first revealed last November.
The Social Security numbers (SSNs) of 1.3 million Chicago voters were compromised when they were distributed to city aldermen and ward committeemen this month.
SC Webcasts UK
Sign up to our newsletters
DV Cleared Systems Architect - 6 Months - London
Computerfutures - London (North), London (Greater)
CISO – Chief Information Security Officer (Up to £100K)
Evolution Recruitment - London (North), London (Greater)
Head of Security Strategy – London
Evolution Recruitment - London (West), London (Greater)
Information Security Manager
Infosec People - Hammersmith, West London
Associate Professor in Cyber Security and Networking
Edinburgh Napier University - Edinburgh, City of Edinburgh
SC Magazine UK Articles
- Russia's Central Bank introduces new mandatory cyber-security regulations
- Private firms to chase cyber-criminals for cash bounties, say police
- Epic hack, thousands of salted logins stolen
- 6 in 10 universities hit by ransomware, 2/3 hit multiple times
- Singapore to shut off internet access for government agencies
- It's a trap! WhatsApp Gold 'premium' version lures users to malware
- SC Awards Europe 2016 winners announcements!
- Microsoft ends common password use and password lockout
- ISIS radicalises 'lone wolves' through strong social media presence
- 1.5 billion Windows computers potentially affected by unpatched 0-day exploit