Online Communities Carry Risks
Online community groups are enticing because the members share common interests. But they also can cause people to make risky financial decisions.
John P. Mello Jr. | 18 Sep | Read more
Online community groups are enticing because the members share common interests. But they also can cause people to make risky financial decisions.
John P. Mello Jr. | 18 Sep | Read more
Optus has launched OfficeApps Mobile Security for small and medium businesses (SMBs), enabling customers to wipe, lock or reset passwords on mobile devices.
Hamish Barwick | 06 Sep | Read more
The proliferation of mobile devices is competitively important for businesses but is creating "chaos" for security professionals, IDC has warned.
Symantec Vision 2011 Sydney in pictures
Neerav Bhatt | 13 Sep | Read more
App store vendors need to collaborate more closely to keep smartphone users safe, including putting together a system for grading application security, according to E.U. cybersecurity agency ENISA.
Mikael Ricknäs | 13 Sep | Read more
A data-breach-investigations <a href="http://www.csoonline.com/article/679874/verizon-advanced-persistant-threat-is-overblown">report issued by Verizon</a> earlier this year found 71 percent of all <a href="http://www.csoonline.com/article/677537/industry-searches-for-lessons-after-rsa-breach">hacking attacks</a> on business take place using remote access or desktop service.
Joan Goodchild | 13 Sep | Read more
When you're in charge of a company's security, you have to actively seek out its weaknesses and then determine how to shore them up. That's what I've been up to lately, as an an offshoot of my <a href="http://www.computerworld.com/s/article/358142/Keeping_the_DMZ_Safe">efforts to harden the DMZ</a>.
Mathias Thurman | 13 Sep | Read more
Security software firm AVG sought to put some more bones on the launch of the new version of its security software product in Prague this week, with the company focusing on mobility and industry initiatives to collectively tackle security threats.
Antony Savvas | 09 Sep | Read more
When my cell phone started acting strange last week, I decided it was a good time to get a new one. I had several features in mind that I felt were essential, and the only phone I could find that had all of them was a Droid. Against my better judgment, I said I would take it.
Ira Winkler | 09 Sep | Read more
It's that time again--<a href="http://www.pcworld.com/article/238644/reader_feedback_taskbar_tip_gmail_management_antivirus_help.html">reader Q&A</a> time, that is. This week I answer questions on getting to Gmail messages when you don't have Internet access and how much security software is too much.
Rick Broida | 08 Sep | Read more
Browser makers have generally been quick to react to the computer compromise at digital certificate issuer DigiNotar, but that hasn't been the case for all mobile phone makers.
Robert McMillan | 07 Sep | Read more
IT people who try to secure mobile devices in a big company face three big conceptual problems.
Kevin Fogarty | 07 Sep | Read more
Since the outbreak of civil unrest in the Middle East, we have seen an increased focus on the role played by social networking and mobility. When these two technologies are combined, the ability of a ‘flash mob’ to rally behind a single idea, or to a single location, has greatly increased.
Rob Forsyth | 05 Sep | Read more
A Melbourne-based app developer has spoken about the security pitfalls of smartphone apps, saying that while certain mobile environments are more susceptible to malware, such risks can be eliminated through encryption and using common sense.
Lisa Banks | 02 Sep | Read more
As AVG Ambassador Tony Anscombe explained the rational behind some of the new features in AVG Internet Security 2012, released today, I couldn't help but think of the bouncer at one of my favourite local pubs.
Stilgherrian | 01 Sep | Read more
Take a deep breath. There's a new report out highlighting a <a href="http://bits.blogs.nytimes.com/2011/08/25/android-number-one-target-by-mobile-hackers-report-says/?nl=technology&emc=cta4">huge spike in threats against Google's Android platform</a>. Yes, it's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab.
Bill Snyder | 31 Aug | Read more
I thought we could examine a recent theme in a little more detail this month: the challenges of dealing with the <a href="http://www.csoonline.com/article/681822/just-say-yes-why-banning-consumer-devices-makes-your-organization-less-secure">consumerization of IT devices</a> in the workplace. We recently completed a study, in partnership with Symantec, that looked at the security and compliance risks of a mobile workforce. It affirmed what I've believed for a long time, namely, that there is a consensus that mobile workers pose a great risk and that, for the most part, businesses are not prepared to mitigate that risk.
Bob Bragdon | 31 Aug | Read more
The community section of Nokia's <a href="http://www.developer.nokia.com/">developer site </a>was hacked, and some member's e-mail addresses have been accessed, the mobile phone maker said.
John Ribeiro | 30 Aug | Read more
The U.S. Federal Communications Commission should take swift action to rule against the Bay Area Rapid Transit (BART) District's recent decision to shut down mobile phone service during a planned protest, several digital rights groups said Monday.
Grant Gross | 30 Aug | Read more
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy and data.
Eric Geier | 29 Aug | Read more