加载中...

Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The flaw was uncovered by security researcher Stefan Viehbock. The vulnerability rests in the Wi-Fi Protected Setup (WPS), a computing standard developed by the Wi-Fi Alliance and used in the majority of wireless home routers being sold today, including products from Cisco and NETGEAR.
France based INSIDE Secure today announced that it has entered into an agreement to provide Intel with INSIDE’s Near Field Communication (NFC) products and technologies.
Security firms Symantec and PhoneFactor separately unveiled solutions today to help organizations deal with the challenges posed by the influx of mobile devices in the workplace.
Conflicting reports over Carrier IQ's software and its usage have sparked lawsuits, additional research, and even speculation that it violates wiretap laws. Meanwhile, Carrier IQ maintains that it has done nothing wrong. And more people are beginning to take its side.
Twitter has acquired mobile security vendor Whisper Systems for an undisclosed sum.
The Philippines Criminal Investigation and Detection Group (CIDG) said on Saturday that with the help of the FBI, four people have been arrested and stand accused of running remote toll scam in order to fund terrorism.
While there is no doubt the amount of malicious programs with Windows in their bull’s eye dwarfs the amount of threats to mobile devices, the focus on Android malware have left some wondering how to separate fact from hype.
Watch an on demand Webcast from SecurityWeek and Symantec to learn more about this intriguing new malware as we provide further analysis on the latest outbreak findings.
The latest version of its Mobile Security Suite brings new mobile device management and security controls, as well as an API to allow service providers and OEMs to integrate with the platform.
On Aug. 9, Microsoft accidentally released information on the five security updates it is planning to release tomorrow as part of this month’s Patch Tuesday.

FEATURES, INSIGHTS // Wireless Security

rss icon

Ram Mohan's picture
Do you allow your employees to surf using open wireless networks from their phones or laptops? What are the easiest ways that attackers can sniff email or gain access to corporate information from these devices? What are the best ways to protect corporation information on the go?
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Markus Jakobsson's picture
In 1998, Intel announced the introduction of processor identities. Anti-fraud practitioners celebrated, security experts busied themselves thinking of the research implications, and privacy advocates were terrified...