MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 14, 2010
Lisa Phifer
Top 10 Mobile Risks to Avoid During Holidays Between online shopping and checking in at work, the holiday season presents a number of security risks for smartphone users. mark for My Articles similar articles
National Defense
June 2011
Sandra I. Erwin
Smartphones-for-Soldiers Campaign Hits Wall as Army Experiences Growing Pains "A smartphone for every soldier" may be a clever slogan. But trying to turn it into reality is becoming an uphill battle for the U.S. Army. mark for My Articles similar articles
InternetNews
September 21, 2010
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. mark for My Articles similar articles
InternetNews
March 10, 2011
'Suspicious Code' in Fake Android Security Patch A security patch for Android smartphones disguised as Google-issued update is being analyzed by Symantec. mark for My Articles similar articles
InternetNews
March 7, 2011
Google Remote Wipes Android Malware Google lays out four steps it's taking to tighten smartphone security. mark for My Articles similar articles
CIO
February 24, 2010
John Brandon
Why You Need a Smartphone Application Strategy It's only a matter of time before employees want to use their smartphones for everything. So CIOs need to start thinking about smartphone apps as part of their enterprise application strategy. mark for My Articles similar articles
InternetNews
December 16, 2010
Mobile-Specific Malware Jumps 33 Percent: Study New report from mobile security software vendor finds a 33 percent spike in malware targeting mobile devices in 2010. mark for My Articles similar articles
InternetNews
March 29, 2010
Smartphones to Lead U.S. Mobile Phones in 2011 Phones that support application downloads and advanced features are set to dominate the industry. mark for My Articles similar articles
InternetNews
July 8, 2009
Don Reisinger
Are Most Smartphones Poorly Designed? The latest and greatest mobile devices too often have serious glitches. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
National Defense
May 2010
Sandra I. Erwin
Army's iPhone Dreams Clash With Reality The Army launched a competition to see if techies can design soldier-friendly smartphone applications. The contest may be premature, however, as it could be years before the Army adopts smartphones as standard soldier equipment. mark for My Articles similar articles
The Motley Fool
December 28, 2010
Kurt Bakke
Apple, RIM, and HTC May Account for Half of All Smartphones Shipped It seems as if three companies will dominate the world market. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
National Defense
August 2011
Eric Beidel
Protectors of Critical Networks Look Within For Vulnerabilities The hacker is only one ingredient in a network intrusion. While leaders are rightly concerned about outsiders breaking into their networks, they also realize that their own employees may have as much to do with the next breach as an outsider. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
National Defense
March 2015
Stew Magnuson
Researchers Uncover New Vulnerability For Computers Used in Public Places Security experts are discovering computers and smartphones being used in public places are vulnerable to hackers even if they are not connected to the Internet. mark for My Articles similar articles
National Defense
September 2010
Sandra I. Erwin
Surge of Cybersecurity Bureaucracies Sparks Lucrative Opportunities For Industry A cybersecurity gold rush is under way amid widespread confusion about how the federal government will oversee efforts to protect the nation's computer networks. mark for My Articles similar articles
The Motley Fool
January 6, 2010
Tim Beyers
Adobe: Now More Popular Than Microsoft Adobe's technologies could become as much a target for hackers as Microsoft's Office suite, BusinessWeek reports. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
IEEE Spectrum
January 2011
Joshua J. Romero
Smartphones: The Pocketable PC Is your phone smarter than a fifth grader? mark for My Articles similar articles
Information Today
May 16, 2011
Laplink Rolls Out New Data Protection Software Laplink Software, Inc. announced the release of PC Lock, data encryption software with cloud management and high security encryption to protect sensitive data from hackers and thieves. mark for My Articles similar articles
InternetNews
November 18, 2009
Wi-Fi Breaches Found in iPhone, Android Devices Mobile security firm successfully hacks several smartphones in warning to industry. mark for My Articles similar articles
Financial Planning
June 1, 2009
Joel P. Bruckenstein
Smartphone Smarts Smartphones will change the way advisors work, letting them enhance productivity and better serve clients. mark for My Articles similar articles
InternetNews
April 28, 2009
Michelle Megna
iPhone Shopping Assistant Courtesy of Google Google's iPhone and Android Product Search apps come out as new research indicates smartphone users are ready to bargain-hunt. mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
The Motley Fool
January 6, 2011
Eric Bleeker
Rising Stars Buy: Apple It's growing, and at a rate much faster than you'd ever know. mark for My Articles similar articles
National Defense
June 2013
Tim Larkins
Threats and Opportunities Growing in Cybersecurity The federal government will spend about $10 billion on cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. mark for My Articles similar articles
IEEE Spectrum
August 2005
My Dad's Computer A conversation with Internet security expert William R. Cheswick. mark for My Articles similar articles
InternetNews
November 20, 2006
Nicholas Carlson
Smartphone Sales Up 50% Smartphone unit sales almost tripled from 2004 to 2005, and increased by 50 percent in the first half of 2006 over 2005. But is anybody really using them for anything else but talking? mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
The Motley Fool
October 30, 2009
Hunter Pavela
Is Android a Threat to Apple? New Android smartphones are poised to challenge the iPhone. mark for My Articles similar articles
InternetNews
December 31, 2010
Smartphone, Social Threats to Mark 2011 Security As enterprises increasingly embrace popular consumer technology, experts warn of coming threats to social networks and popular devices like the iPhone. mark for My Articles similar articles