Enterprises in the Asia-Pacific region are increasingly adopting mobility. However, few of those firms have a clear strategy of how to use mobile devices effectively in the workplace, a survey by IDC finds.
The Blackphone, a smartphone offering encrypted communications (phone calls, browsing, email, text), made headlines at last week's DEF CON conference in Las Vegas. Unfortunately, most of those headlines were inaccurate.
Read the hottest MobileIT news for Wednesday, August 13, including what's more to rugged tech development, Nvidia's detail release on Project Denver, advice for T-Mobile to take Illiad seriously, Lookout Mobile Security's eyes on the enterprise and SeaWorld's CIO on mobile app development.
Many early attempts at 'Windows tech support' scams--with a caller telling the victim that their computer is sending out tech support requests--had a lower success rate because U.S. targets were put off by the heavily accented English of offshore scammers.
Mobile security is a hot topic at the Black Hat security conference being held this week in Las Vegas. I am here at Black Hat and will be sharing mobile security insights with you in the coming days.
Apple is defending the undocumented services resident on iOS devices, which security researcher Jonathan Zdziarski says can be used as a backdoor to sensitive data, as a diagnostic tool for enterprise IT departments, developers and AppleCare service personnel.
Apple has inserted backdoors into iPhones that could enable an unauthorized person to harvest pictures, text messages and other sensitive data from the device without the user's knowledge, Jonathan Zdziarski, an iOS jailbreaker and forensic expert, told attendees of the Hope X conference held in New York over the weekend.
Scammers who take over smartphone processors can use them to mine for bitcoins, and they can generate a good amount of value too--if they commandeer more than 14 million devices. That's the number of Galaxy S3s needed to mine a single bitcoin in one day, according to a blog post from cybersecurity firm Lookout.
Companies are struggling to deal with the flood of personal devices coming into workplace. Here are six success factors from cloud and mobile security provider Bitglass that IT managers should keep in mind when crafting a BYOD program.
Watch out. It appears that one of the gravest security threats to your home is not stealthy burglar but a connected light bulb.