Similar Articles |
|
InternetNews December 14, 2010 Lisa Phifer |
Top 10 Mobile Risks to Avoid During Holidays Between online shopping and checking in at work, the holiday season presents a number of security risks for smartphone users. |
National Defense June 2011 Sandra I. Erwin |
Smartphones-for-Soldiers Campaign Hits Wall as Army Experiences Growing Pains "A smartphone for every soldier" may be a clever slogan. But trying to turn it into reality is becoming an uphill battle for the U.S. Army. |
InternetNews September 21, 2010 |
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. |
InternetNews March 10, 2011 |
'Suspicious Code' in Fake Android Security Patch A security patch for Android smartphones disguised as Google-issued update is being analyzed by Symantec. |
InternetNews March 7, 2011 |
Google Remote Wipes Android Malware Google lays out four steps it's taking to tighten smartphone security. |
CIO February 24, 2010 John Brandon |
Why You Need a Smartphone Application Strategy It's only a matter of time before employees want to use their smartphones for everything. So CIOs need to start thinking about smartphone apps as part of their enterprise application strategy. |
InternetNews December 16, 2010 |
Mobile-Specific Malware Jumps 33 Percent: Study New report from mobile security software vendor finds a 33 percent spike in malware targeting mobile devices in 2010. |
InternetNews March 29, 2010 |
Smartphones to Lead U.S. Mobile Phones in 2011 Phones that support application downloads and advanced features are set to dominate the industry. |
InternetNews July 8, 2009 Don Reisinger |
Are Most Smartphones Poorly Designed? The latest and greatest mobile devices too often have serious glitches. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
National Defense May 2010 Sandra I. Erwin |
Army's iPhone Dreams Clash With Reality The Army launched a competition to see if techies can design soldier-friendly smartphone applications. The contest may be premature, however, as it could be years before the Army adopts smartphones as standard soldier equipment. |
The Motley Fool December 28, 2010 Kurt Bakke |
Apple, RIM, and HTC May Account for Half of All Smartphones Shipped It seems as if three companies will dominate the world market. |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
National Defense August 2011 Eric Beidel |
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
National Defense March 2015 Stew Magnuson |
Researchers Uncover New Vulnerability For Computers Used in Public Places Security experts are discovering computers and smartphones being used in public places are vulnerable to hackers even if they are not connected to the Internet. |
National Defense September 2010 Sandra I. Erwin |
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. |
The Motley Fool January 6, 2010 Tim Beyers |
Adobe: Now More Popular Than Microsoft Adobe's technologies could become as much a target for hackers as Microsoft's Office suite, BusinessWeek reports. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
IEEE Spectrum January 2011 Joshua J. Romero |
Smartphones: The Pocketable PC Is your phone smarter than a fifth grader? |
Information Today May 16, 2011 |
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. |
InternetNews November 18, 2009 |
Wi-Fi Breaches Found in iPhone, Android Devices Mobile security firm successfully hacks several smartphones in warning to industry. |
Financial Planning June 1, 2009 Joel P. Bruckenstein |
Smartphone Smarts Smartphones will change the way advisors work, letting them enhance productivity and better serve clients. |
InternetNews April 28, 2009 Michelle Megna |
iPhone Shopping Assistant Courtesy of Google Google's iPhone and Android Product Search apps come out as new research indicates smartphone users are ready to bargain-hunt. |
Fast Company Steven Melendez |
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. |
The Motley Fool January 6, 2011 Eric Bleeker |
Rising Stars Buy: Apple It's growing, and at a rate much faster than you'd ever know. |
National Defense June 2013 Tim Larkins |
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. |
IEEE Spectrum August 2005 |
My Dad's Computer A conversation with Internet security expert William R. Cheswick. |
InternetNews November 20, 2006 Nicholas Carlson |
Smartphone Sales Up 50% Smartphone unit sales almost tripled from 2004 to 2005, and increased by 50 percent in the first half of 2006 over 2005. But is anybody really using them for anything else but talking? |
CIO July 15, 2001 Fred Hapgood |
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... |
The Motley Fool October 30, 2009 Hunter Pavela |
Is Android a Threat to Apple? New Android smartphones are poised to challenge the iPhone. |
InternetNews December 31, 2010 |
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone. |