Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

cybersecurity

Security researcher blasts Tizen: 'May be the worst code I've ever seen'

Israeli security researcher criticizes Tizen, a Samsung-backed Android alternative, for its many security flaws.

08 firewall

Face-off: Cisco vs. Fortinet for enterprise firewalls

Considering an enterprise-grade firewall? Download this free report for side-by-side comparisons of rival products from Cisco and Fortinet, based on reviews written by enterprise users of the products.

smarthub

What home products are most susceptible to cyber burglars?

In the matter of the Dyn situation, it was those Internet of Things devices that created the voluminous distributed denial of sevice attack. A DVR was used to attack Dyn’s network. To reduce the impact of such attacks, officials at...

7 encryption

Encryption critical for protecting mobile device data

More and more personal data is being stored on mobile devices, and without encryption, this data can easily fall into the wrong hands.

wearables and security primary2

10 things you need to know about the security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats.

iot energy

How to bring true interoperability to the Internet of Things

Multimode radios, software flexibility and hardware-based security allow IoT devices to work in concert in the home.

information security threat primary4

9 biggest information security threats through 2019

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

mobile threat chart

Malware infection rate of smartphones is soaring – Android devices often the target

Smartphones are by far the most popular target of mobile malware, and the infection rate is soaring, according to new research by Nokia.

old pcs computers desktops trash recycle

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.

android security

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked.

burlap money bag

Enterprises misaligning security budget, priorities

Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new...

smartphone security

Acoustic attack lets hackers control smartphone sensor

The acoustic injection attack takes advantage of a newfound vulnerability in smartphones and lets hackers remotely control the devices.

secusuite for samsung knox 1

BlackBerry readies a more secure version of the Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

windows spyware

Appeals court rules Americans have no legal recourse if hacked by foreign governments

An appeals court in Washington, D.C., yesterday upheld a lower court ruling denying an American citizen the right to sue the government of Ethiopia for hacking his home computer.

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

20170225 mwc 2017 sign closeup

Mobile World Congress 2017: Mobility monsters

GSMA has brought everything mobile to Mobile World Congress 2017 in Barcelona, painting a picture of mobile world domination.

cog systems d4 secure htc a9 ip address

Cog Systems offers more secure version of HTC A9 smartphone

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind...

rsa

Big 3 endpoint vendors battle glitzy startups at RSAC

Three of the original anti-virus vendors – Symantec, McAfee and Trend Micro – were out in full force at the show as well, scoffing at the unproven point products of the startups and touting their own reorganizations, renewed focus and...

connected cars 10

Are you afraid your car will be taken over?

A consortium was recently created to make sure that your car stays on the road and in your control.

Load More
Top News