Google has signaled a shift in focus for its Android operating system toward’s the enterprise market with its new Android Work component, a feature of its upcoming mobile OS that provides mobile device management (MDM) features and IT controls to Android. This is in re...
The company whose logo used to be the cracked Liberty Bell has some crack’s in its own data security policies. AT&T sent out letters this week to its wireless customers this week informing them that an unspecified number of customers have had the personal information bre...
We Bring Superior Mobile Device Management to Your Business Comodo Mobile Device Management (CMDM) provides IT administrators with a rich set of capabilities to secure and manage large-scale deployments of corporate and personal mobile devices – all from a single console. CM...
Many people believe that mobile phones are immune from the type of malware attacks that plague desktop systems. Two separate ransomware attacks in recent weeks demonstrate that such thinking is out of touch with today’s reality. Ransomware is an attack strategy where hackers...
If a person is arrested for a routine traffic violation and has a personal computer conceal in their car trunk and a smartphone in their pocket, the police have no legal right to search their computer because it is considered protected under the 4th Amendments’ prohibition o...
Mobile Devices, such as smartphones and tablets, are the hottest portion of the computing market these days. The fastest growing segment of this market is devices that use the Android operating system. This has not gone unnoticed by hackers and fraudsters who seek to exploit...
Developers of Replicant, an open source variant of Android, claim to have identified a security flaw in some Samsung Galaxy Android based devices that could allow for remote access to user data. Replicant develop Paul Kocialkowski, blogged last week that a broadband processo...
PGP stands for Pretty Good Privacy which is a software package that is employed to encrypt data especially for files and emails. My idea of writing this article is to make people understand how PGP contributes in the general security as it will help them in making good decis...
Mobile device security, long neglected by device makers, Internet software makers and end users, is increasingly becoming a high priority. Mobile is the direction of computing these days, and hackers are approaching the popular mobile platforms as targets of opportunity. Com...
A breakout hit TV series is this years is “Agent’s of S.H.I.E.L.D.” about a government organization that protects society against villains with super powers. In the real word, Google has its own Project Shield that will protect web sites from villains who execute Directed De...