Five tips for pentesters in iOS, from Denise Giusto Bilić at ESET
Denise Giusto Bilić, Security Researcher at ESET , looks at recommendations for pentesters looking for
Denise Giusto Bilić, Security Researcher at ESET , looks at recommendations for pentesters looking for
AdaptiveMobile Security has confirmed multiple customers for its SIGIL beta-programme. SIGIL is the world’s first
Welcome to the third edition of the Mobile Security and Risk Review. This bi-annual review provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organisations.
Zscaler, the cloud security provider has discovered a fake app posing as the popular television service, Netflix. Zscaler discovered this malicious app on a third party app store and advises all users to only purchase form authorised Google play stores in the future.
Lookout, the global leader in securing mobility, today expanded Mobile Threat Protection with the introduction of Network Protection, an automatic on-device analysis of network connections to defend against man-in-the-middle attacks and ensure information is being securely transmitted.
Tim Compston, Features Editor at SecurityNewsDesk, looks at the key challenges for organisations when it comes to managing the rise of cloud applications in an increasingly mobile world.
Strong authentication in the mobile world Andrew Lintell, Director of Sales, Identity Assurance, EMEA at HID
‘Risky Mobile Business’ revealed by Blancco Technology Group Blancco Technology Group (BTG) have recently released
Legal Technologies unveil 5 things stored on work devices Legal Technologies – the corporate forensic
Honeywell (NYSE:HON) has announced the key technology trends including cloud based solutions, the rapid proliferation of
Copyright notice This website and its content is copyright of Security Buyer – © Hand Media International LTD 2021. All rights reserved. Any redistribution or reproduction of part or all of the contents in any form is prohibited other than the following: you may print or download to a local hard disk extracts for your personal and non-commercial use only you may copy the content to individual third parties for their personal use, but only if you acknowledge the website as the source of the material You may not, except with our express written permission, distribute or commercially exploit the content. Nor may you transmit it or store it in any other website or other form of electronic retrieval system.