Tag "Mobile Security"

Back to homepage
Mobile

Mobile Security For The Modern Workplace: How To Boost Remote Productivity While Remaining Secure

The continued white-hot proliferation of personal devices has led to businesses adopting cultures where employees can contribute remotely, using whatever device is accessible. For many, this has led to Bring

Hardware/Network Mobile

Personal mobile devices are the biggest threat to your network

Remote working and BYOD may be popular among employees but both pose a high risk to IT and security teams.Personal device use for remote work poses the biggest security risk

Software

A guide to cyber attacks: Malware – Part 1

As part of a three part guide on cyber attacks, we begin by exploring existing types of malware.Malware, short for malicious software, refers to any malicious coding that can infiltrate

Mobile

Number of smartphone users relying on software-only biometric security to grow 250%

A new report from Juniper Research predicts that the biggest shift in mobile payment security will be the move towards software-based methods, which rely on standard smartphone components.The research forecasts

Mobile

Air Canada mobile app breached

Personal data may have been compromised. Payment data is safe, though. Personal data from 20,000 Air Canada users may have been compromised, the company announced this Tuesday. Hackers probably got their

Mobile

Mobile operators must take more responsibility over our phone security

Cybercriminals have become increasingly adept at tricking telecoms into granting them access to customer’s phones. So you think you’re pretty security savvy. You use complex passwords for all your online

Mobile

T-Mobile Data Breach

T-Mobile has experienced another data breach, as reported by TechCrunch.  Hackers stole customer stole names, billing zip codes, phone numbers, email addresses, account numbers, and account type in what the company

Mobile

No Financial Data Compromised in T-Mobile Breach

The cybersecurity team at T-Mobile discovered and halted an attack after a malicious actor had gained unauthorized access to the personal information of some customers during an ongoing security breach that the

Identity Theft

Breaking the credential reuse cycle

Using the same password after a data breach can put your accounts and data at great risk. Data breaches affecting large online service providers persist even as these incidents bring

Hardware/Network

Say Goodbye to Passwords, the Future of Authentication is Here

It has been clear for a while now that passwords no longer provide the user experience or security needed for consumers today. Take the fact that a few months ago,