Secure identity experts give organisations secure access on Windows Phone 8.1 with virtual smart cards
Browsing: Endpoint security
Experts think this was linked to changes in the technical infrastructure used in the malicious campaign rather than spelling the end of the Luuuk campaign.
AccessData announces industry’s first mobile threat detection and response for iOS™and Android™ mobile devices, fully integrated with ResolutionOne
As a start, let’s take a look at Ransomware – staking its claim as one of the major attack trends.
Bromium, the pioneer of a new model of endpoint security using micro-virtualization, announced the results of Endpoint Protection: Attitudes and Opinions
Hackers have launched a massive phishing campaign to exploit the fear generated by the Cryptolocker ransomware.
McAfee, part of Intel Security, and LG Electronics announced that the new LG G3 will come pre-installed with a version of McAfee Mobile Security
when it comes to the top ad libraries, social medial libraries and other libraries which affect data privacy – enterprises aren’t as safe as they may think.
When ESET researchers analysed the first file-encrypting Trojan to demand a ransom from Android users it was anticipated.
ESET experts have caught the first example of an Android mobile Trojan, which they named Android/Simplocker.