mobile
In addition to the fingerprint scanner, there is another new hardware component in iPhone 5S that security-minded folks...Read more
Information security professionals need to keep an eye on the always-evolving cyber threat landscape. Accomplishing this...Read more
Apple’s introduction of two-step verification for Apple IDs is consistent with the trend in the industry to strengthen...Read more
User authentication is usually discussed in the context of the person's initial interactions with the system—a safeguard...Read more
If you think your mobile phone is already deeply embedded in your life, consider the critical role it will have in just...Read more
Phishing—a technique grounded in social engineering—remains an effective way for attackers to trick people into...Read more
The the most popular method for distributing malware for mobile devices has been grounded in social engineering. We...Read more
Mobile phones are now part of the battlefield that encompasses Internet-based crimes. Recent incidents involved the...Read more
People use the term consumerization of IT when discussing the effects of user-owned and managed devices being increasingly...Read more