Viele Anwender können noch nicht wirklich Business-gerecht mit mobilen Geräten umgehen. Das Analystenhaus IDC zeigt: Nicht etwa Containerlösungen, sondern Schulungen sind die wirksamste Maßnahme...
Post-Gazette.com - This story is part of Surveillance Society, a series examining the implications of privacy intrusions, many of which occur on a daily...
Booby-trapped MMS messages and websites exploit flaw in heart of Android. Source: 950 million Android phones can be hijacked by malicious text messages | Ars...
During 2014-2015, an estimated 900 million consumers will have been affected by data breaches, according to Accenture's Digital Trust in the IoT Era report....
Der Datenschutz. Ein leidiges Thema für App-Entwickler und überhaupt für alle, die daran beteiligt sind, eine App auf den Markt zu bringen. Immer ist...
All mobile-enabled enterprises risk breaches unless IT managers buttress a well-thought-out security policy with tools to enforce it. A single, comprehensive solution is simpler...
Die meisten deutschen Internetnutzer gehen beim Surfen Sicherheitsrisiken ein. Während die einen die Gefahren gar nicht kennen, sind sie den anderen schlicht egal. ... read...
Researchers sneak password-stealing app into Apple Store to demonstrate threat. ... read more at Serious OS X and iOS flaws let hackers steal keychain, 1Password...
As many as 600 million phones vulnerable to remote code execution attack. ... read more at New exploit turns Samsung Galaxy phones into remote bugging...
Researcher publishes proof-of-concept code demonstrating how attack works. ... read more at Serious iOS bug makes it easy to steal users’ iCloud passwords | Ars...
The retail industry alone accounted for 43% of the more than 500 data compromises investigated in 15 countries in the past year, a report shows... read...
Today, technologies like cloud computing, mobility, social, and big data and analytics are enabling small- and midsized businesses (SMBs) to do more with less,...
An estimated 630 million phones fail to purge contacts, e-mails, images, and more. ... read more at Flawed Android factory reset leaves crypto and login...
"Five Eyes" intelligence agencies built tools to spot Google, Samsung app protocols. ... read more at There’s an app for that: How NSA, allies exploit...