From disgruntled employees to guest accounts, mobile devices are creating new headaches for IT. Find out how to harden your organization against the most common offenses.
The casing features a smart card reader and fingerprint sensor to secure network access, messaging, data protection, and authentication for mobile devices.
Get the answers to the questions provided here BEFORE you decide to go with any particular mobile apps vendor.
Kapersky's Mobile Security Lite app lets Android users lock, block, and track their lost or stolen devices.
Pyxis Mobile announced today that it is relaunching the company under the new name Verivo Software, a move designed to quickly establish Verivo as a major mobile enterprise applications player.
Integrated wireless video capabilities and communications give police and mobile first responders fast access to emergencies and crimes.
Mobile security breaches can be devastating - as those included here show. Learn what your business can do to protect itself.
The US CERT has issued an advisory that the WiFi Protected Setup computing standard is susceptible to brute force attacks; researchers quickly released tools that demonstrate this vulnerability.
Banks, telcos and government agencies are just three examples of the organizations that are leveraging voice to streamline and enhance authentication, including on mobile devices.
The Carrier IQ controversy continues, as Sprint removes the hidden software from its mobile devices--at least until further review. Other wireless service providers echo Sprint’s assertion that customer privacy was never violated.