Nokia Revises Strategy: Opens Security Hub In Berlin

Nokia Revises Strategy: Opens Security Hub In Berlin

31 December 2014

Nokia recently introduced its new centre of security in the German capital, Berlin. This was done in consideration for the changes made to the company’s strategy concerning mobile security.  This new, state of the art, security centre will include a startup space, an area for demos and various facilities for research. The major purpose of […]

Read the full story

Posted in UncategorizedComments (0)

Should You Be Worried About Spyware?

Should You Be Worried About Spyware?

29 December 2014

If you own a smart phone the likelihood is that at some point you have wondered about the odds of there being a spyware on your device. The bad news is that anyone, literally anyone, can become a victim of spyware. And there is no good news in this story. The Three-Headed Monster If you […]

Read the full story

Posted in Cell Phone TrackingComments (0)

How Would An Old Law Help US Courts To Bypass Phone Encryption?

How Would An Old Law Help US Courts To Bypass Phone Encryption?

26 December 2014

The law enforcement agencies in the United States (US) have been tirelessly pushing for laws that will require a security backdoor on your phone for the sake of public transparency in the eyes of their government. Due to the loss of public trust in these security agencies, especially the National Security Agency (NSA) after it […]

Read the full story

Posted in UncategorizedComments (0)

FBI Detects Malware That Can Override Hard Drive of Major Businesses

FBI Detects Malware That Can Override Hard Drive of Major Businesses

24 December 2014

Thanksgiving this year didn’t go well for many American businesses after they received a warning from the Federal Bureau of Investigation (FBI) that a destructive malware was on the prowl and has the potential to override hard drives. The FBI sent a five-page document to all IT teams working at major US businesses and notified […]

Read the full story

Posted in UncategorizedComments (0)

Can Security Software Block Down Exploit Attacks?

Can Security Software Block Down Exploit Attacks?

22 December 2014

To get into the botnet business, you do not need to be an excellent programmer. All you need to do is buy any of the available exploit kits and you are perfectly set. You can even rent out an exploit kit or an entire botnet if you prefer. A typical exploit kit consists of a […]

Read the full story

Posted in UncategorizedComments (0)

Cyberbullying: After School App Gets The Boot

Cyberbullying: After School App Gets The Boot

19 December 2014

With each new day we have some developer or the other coming up with a new app that is targeted at youngster. Most recently, the trend has been targeting tweens and teens at an increasing rate. “After School” was one more app that aimed to tap into the market through kids. However, it took only […]

Read the full story

Posted in Parental ControlComments (0)

Security Apps Which Can Help Keep Your Phone Safe

Security Apps Which Can Help Keep Your Phone Safe

17 December 2014

A plethora of security applications are available which were created just for you to keep mobile phones and private data safe from malware, snooping apps and thieves, all of which want access to personal information. When looking for mobile security apps, the following are things to consider: Keeping quality protected: despite there being real threats; […]

Read the full story

Posted in Cell Phone TrackingComments (0)

Android Devices Available At Bargains May Have Security Vulnerabilities

Android Devices Available At Bargains May Have Security Vulnerabilities

15 December 2014

This Black Friday, a large number of retailers are willing to give customers amazing deals on smart phones and tablets this year. Not all products offered however are safe for buyers to purchase according to a research which was conducted by a security company called the Bluebox Labs. While these Android tablets may be cheaper, […]

Read the full story

Posted in UncategorizedComments (0)

1 3 4 5 6 7 22