Fingerprint identification systems could sweep through the world faster than most have predicted, according to Ericcsson, the world’s largest cellphone network maker - based on opinion polls of 100,000 smartphone users around the world.
Search results for: "BYOD"
Have you been wondering what trends in security and privacy ESET researchers are predicting for 2014? The following is a sampling, a year-end snack plate if you will, featuring predictions from Aryeh Goretsky, Righard Zwienenberg, David Harley, Cameron Camp, Lysa Myers, and more.
Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work - a practise described as "Bring Your Own Disaster" by IT wags for years. Disasters, of course, DO happen - our tips should help you avoid being the guy who brings one.
Mobile threats are becoming more complex, and more difficult to deal with as more and more devices become connected, a former vice-president of security trade body ISACA has warned.
Iron Mountain claims that up to two-thirds of employees work from home in Europe at least part of the time - but a mere 18% of firms offer guidance on how to protect information outside the office.
Many people leave phones and tablets “open” to criminals - both the cyber variety, and the ordinary, non-cyber kind. Our tips should help your handset safe.
Spyware is a growing threat on Android phones, according to research by Kindsight Labs, a division of Alcatel-Lucent.
A BYOD dissonance between economic imperative and loss of central control? Discontented staff susceptible to social engineering? David Harley reflects on aspects of Business Reimagined, a new book by Dave Coplin, chief envisioning officer at Microsoft UK, interivewed by Ross McGuinness in Metro.
ESET security researchers release white paper looking at the first six months of Windows 8. Just how secure is Microsoft's new operating system?
A look at Windows 8 during the first six months of its release. Just how well is it holding up, security-wise? The challenges faced by developers in securing Modern Windows and how piracy in the Windows Store might affect BYOD rollouts in the enterprise.
Everybody knows that laptop computers, tablets and smartphones get stolen, and everybody reading this probably owns at least one of these digital devices, so should you be concerned about yours being pinched, pilfered, peculated, purloined, or in other words, stolen?
The slides for many of the presentations by ESET researchers at VB 2012 can now be found on the Virus Bulletin conference web pages.
A new study finds that only 1 in 10 consumers have had any classes or training about protecting their computer and/or their personal information during the last 12 months. Indeed, a shocking 68 percent say they have never had any such training, ever. These and other findings, first revealed by ESET at the Virus Bulletin
Does the enterprise still have a choice about sharing information?
Does your company have a written information security program? If not, you could be an easy target for cybercriminals AND end up on the wrong side of the law, regardless of where your company is located or what size it is. Which law? Something they passed about two years ago in the Commonwealth of Massachusetts,
In a recent survey of people in America who use their smartphone for work, less than a third said they employ the password protection on their smartphones. Although everyone will agree that not protecting your smartphone isn’t smart, it is all about memorizing. Everyone that has an Android-based device knows they do not have to
While our recent post on BYOD focuses on the prevalence and/or risk of inadequately trained staff potentially creating problems for the core IT infrastructure using their own personal devices for work, it seems others here at RSA are concerned with preventing the exact same thing, but from a different angle. I attended one “lighting round”