It's already started, with a refrigerator that sent out email spam. The Internet of Things trend shows how even a benign consumer appliance could pose a danger to enterprises if connected to the Internet without proper security.
Home routers and other consumer embedded devices are plagued by basic vulnerabilities and can't be easily secured by non-technical users, which means they'll likely continue to be targeted in what has already become an increasing trend of mass attacks.
A vulnerability in Android that was publicly disclosed in mid-March could be exploited by malicious applications to force devices into an endless reboot loop, according to security researchers from Trend Micro.
Aruba Networks announced a package of software upgrades designed to better accommodate all-wireless workplaces, including sites where it's common to see employees using three different mobile devices with multiple applications.
One day after announcing the Galaxy S5 smartphone with a security-focused fingerprint scanner, Samsung announced that second-generation Knox software for enterprise-level security and management of Samsung devices will ship sometime in the second quarter.
Today's security suites try to protect all (or most) of your devices, and provide Web-based management. We examine how seven major applications compare in terms of features, ease of use and which devices they actually protect.
Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices.
In the past week, two new ultra secure smartphones have been in the news. One is called the Blackphone. The other is called the Black phone. The difference in their names is a space. Here's what we know about the two most secure smartphones ever created.