California lawmakers introduced a bill that would require a "kill switch" for every mobile smartphone or tablet sold in the state.
At the CES International this year, BMW and Audi proudly demonstrated driveless cars that can steer, brake and throttle autonomously using sensors. What they failed to discuss was whether their driveless cars were vulnerable to hijacking by a hacker.
More than three-quarters of IT pros are using or planning to use network access control technology to improve mobile security, according to a survey of more than 750 IT pros by CyberEdge Group on behalf of NAC vendor ForeScout Technologies and eight other IT security firms.
To secure mobile devices without alienating users in a BYOD environment, 30 percent of firms will employ biometric authentication for mobile devices by 2016, predicts Gartner.
App vulnerabilities, malware and mobile device security are the top three areas of concern for 12,396 security pros surveyed by market research firm Frost & Sullivan.
More than one-third of U.S. adults use their smartphones to control their home security systems, yet close to half admit to sharing their smartphone passwords with at least one other person
Apparently, there is a reason why the birds in the Angry Birds smartphone app are angry--they are being used as pawns in the National Security Agency's global surveillance dragnet, according to media reports citing documents from Edward Snowden.
By the end of 2016, around 30 percent of enterprises are forecast to choose cloud-based user authentication solutions and a similar percentage of enterprises are expected to use contextual authentication for employee remote access, says Gartner in its last Magic Quadrant for User Authentication report.
Security will be "critical" for the development of machine-to-machine and the Internet of Things this year, particularly for end points and in the data center, says Strategy Analytics.
The cost of contact center fraud is significant to both companies and customers, and the number of security breaches is growing "briskly," warns Ken Landoline, principal analyst for business technology and software at Current Analysis, in a blog.