Similar Articles |
|
Entrepreneur June 2004 Eric Bender |
Die Hard? Could smartphones really put laptops 6 feet under? |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
IEEE Spectrum January 2011 Joshua J. Romero |
Smartphones: The Pocketable PC Is your phone smarter than a fifth grader? |
InternetNews December 14, 2010 Lisa Phifer |
Top 10 Mobile Risks to Avoid During Holidays Between online shopping and checking in at work, the holiday season presents a number of security risks for smartphone users. |
InternetNews November 20, 2006 Nicholas Carlson |
Smartphone Sales Up 50% Smartphone unit sales almost tripled from 2004 to 2005, and increased by 50 percent in the first half of 2006 over 2005. But is anybody really using them for anything else but talking? |
National Defense June 2013 Valerie Insinna |
Personal Devices Pose Challenge for Defense Department Security The proliferation of smartphones has caused a dramatic shift in how hackers target the Defense Department and its industrial base, cybersecurity company officials said. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews December 16, 2010 |
Mobile-Specific Malware Jumps 33 Percent: Study New report from mobile security software vendor finds a 33 percent spike in malware targeting mobile devices in 2010. |
CIO February 24, 2010 John Brandon |
Why You Need a Smartphone Application Strategy It's only a matter of time before employees want to use their smartphones for everything. So CIOs need to start thinking about smartphone apps as part of their enterprise application strategy. |
CIO March 15, 2004 Christopher Lindquist |
Model Hacker Behavior - Under Development Forget about patches. Researchers at the Florida Institute of Technology are looking for ways to fight hackers by modeling their methods, or "exploits." The research could eventually lead to new types of security tools capable of stopping attacks that hackers haven't even invented yet. |
InternetNews December 28, 2010 |
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. |