Asia's Source for Enterprise Network Knowledge

Sunday, December 11th, 2016

mobile security

How to maintain data and document security with a mobile workforce

Wireless security

Pragmatic approach

How to maintain data and document security with a mobile workforce

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Keeping data safe while enabling a mobile workforce doesn’t need to be difficult.

Employees feel pressure to use personal smartphones at work

Employees feel pressure to use personal smartphones at work

Businesses are encouraging employees to use personal devices for work purposes, but according to a recent survey, without a proper BYOD strategy and reimbursement plan in place, it might be decreasing productivity.

Black Hat Europe: IoT devices can hack phones

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Black Hat demo shows Belkin WeMo devices stealing pictures, monitoring the location of Android phone

Researcher unveils second Samsung Pay vulnerability

BlackBerry will attempt its last hurrah with a pair of mid-range smartphones

A security researcher has found a second vulnerability in Samsung Pay

5 trends shaking up multi-factor authentication

biometric

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage, would make hardware tokens extinct.

Security concerns rising for Internet of Things devices

IOT Security

The burgeoning market for gadgets that trigger a sprinkler system, help you count the number of times you swing a bat, or dim the lights automatically are rising.

Report: Smartphone infection rate doubled in first half of 2016

BlackBerry will attempt its last hurrah with a pair of mid-range smartphones

Smartphone infection rates nearly doubled during the first half of this year

What this expensive 'secure' phone tells us about mobile hacking

What this expensive ‘secure’ phone tells us about mobile hacking

Will a $12,000 phone protect you from mobile malware?

5 products leading the enterprise mobile management pack

5 products leading the enterprise mobile management pack

Companies are moving towards an enterprise mobile management strategy in order to keep up with the increasing demands and risks of a mobile workforce. Here are five companies that, according to Gartner, are leaders in the EMM market.