SmartPhones stories - Page 85
Unmanaged wearables pose threat to the enterprise
Tue, 8th Mar 2016
#
wearables
#
physical security
#
centrify
Wearable device owners in the enterprise are neglecting login credentials, posing a growing IT security concern, warns Centrify RSA Survey.
There's no such thing as Mac OS X ransomware, right?
Mon, 7th Mar 2016
#
malware
#
ransomware
#
cybersecurity
OS X users have been hit with the first known case of Mac 'ransomware' malware, found in the recently released BitTorrent client app Transmission.
Three ways emoji are changing social marketing
Mon, 7th Mar 2016
#
marketing
#
social media
#
emoji
The rise of emojis is changing the game for social marketers, offering richer insights, visual storytelling, and branding potential.
Going mobile: How to have secure file-sharing, backup recovery and access
Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.
Stop bullying Apple around and start doing some intelligence homework
Tue, 1st Mar 2016
#
apple
#
it industry
#
fbi
The FBI should stop bullying Apple and the technology industry and spend their time and energy instead on figuring out other ways of investigating.
Wireless home security market to reach $32 billion by 2019
Mon, 29th Feb 2016
#
network infrastructure
#
sdn
#
smart home
The emergence of customised solutions and integrated packages will significantly boost the global wireless home security market until 2019.
Endpoint data protection: A buyer's checklist
Mon, 29th Feb 2016
#
storage
#
data protection
#
dr
Endpoint data is often one of the most forgotten aspects of an enterprise data protection strategy, yet it is among the most valuable to a company.
Can your iPhone be hacked using just Play-Doh? Yep.
Fri, 26th Feb 2016
#
biometrics
#
apple
#
apple iphone
Touch ID may not be as secure as you thought, with a mobile security company getting around the security with an unlikely partner in crime: Play-Doh.
Can one security solution protect two very different people?
Thu, 25th Feb 2016
#
cybersecurity
#
dicker data
#
distributors
Picture two people from a large organisation. They have different needs and completely different levels of access to their network. Can it work?.
Nokia ramps up data center play
Tue, 23rd Feb 2016
#
devops
#
hyperscale
#
dc
Nokia has launched new data center services and teamed up with integrated manufacturing company Sanmina to collaborate on data center solutions.
Why the Government needs to leave Apple and Google encryption alone
Mon, 22nd Feb 2016
#
encryption
#
google
#
apple
It doesn't make any sense to put so much pressure on Apple or Google when in the end, they don't control all the keys to the kingdom.
ESET jumps from 'niche player' to 'visionary' in endpoint protection
Mon, 22nd Feb 2016
#
malware
#
cybersecurity
#
gartner magic quadrant
ESET makes the jump from 'niche player' to 'visionary' in Gartner's latest endpoint protection platform magic quadrant. So how did other vendors fare?.
Biometrics, federated identities, data security: The biggest disruptors for eCommerce
Wed, 10th Feb 2016
#
biometrics
#
apple
#
samsung
Biometrics, federated identity, and tokenisation will transform eCommerce, says new report by Juniper Research.
Spam goes mobile
Fri, 5th Feb 2016
#
malware
#
cybersecurity
#
kaspersky
Spam shifts to smartphones as email junk declines, with cybercrooks crafting mobile malware, Kaspersky warns of rising threat.
Facebook turns 12: Bigger, better and more secure
Fri, 5th Feb 2016
#
facebook
#
social media
#
opinion
Hard to believe it but Facebook has only just turned 12, meaning it is still young enough to have not been around at the turn of the millennium.
Will your trusted digital device become your biggest enemy?
Wed, 3rd Feb 2016
#
uc
#
wireless networks
#
cloud services
As digital devices become a staple of people's every day lives, personal and private information is increasingly at risk.
Yamaha Music customers get interactive with digital signage
Thu, 21st Jan 2016
#
digital signage
#
signagelive
#
pro av
Yamaha Music customers now have a more interactive experience when visiting the company's retail partners, thanks to digital signage and smartphones.
Organisations need to adopt a zero-trust approach
Tue, 19th Jan 2016
#
cybersecurity
#
exc saltbush
#
tablets
Organisations need to change their attitudes when it comes to network security, and must acquire a zero trust approach to prevent disruption.
Demand for secure identity solutions grows
Tue, 19th Jan 2016
#
uc
#
wearables
#
cybersecurity
Key trends including ongoing advancements in privacy protection and a more mobile and connected experience will have a big impact on secure identities.
New Backstab cyberattack targeting iOS devices
Mon, 14th Dec 2015
#
malware
#
firewalls
#
network infrastructure
The BackStab attacks see cyber criminals use malware to remotely infiltrate computers, with iOS devices particularly vulnerable.