Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
 
Mobile computing security
Endpoint Security For Enterprise Mobile Users Expanded For iOS 4 Devices
Mobile computing security : 05 July, 2010
McAfee is expanding protection of mobile devices for business users with Mobile Device Management and endpoint protection capabilities now available for the latest Apple mobile operating system iOS 4
 
USB Based Mobile Identity Management
Mobile computing security : 01 July, 2010
Mobile workers now have the use of HOB Planet mIDentity for gaining secure access to company information resources whilst on the move using a USB pluggable portable security module
 
Parental Control Suite For Apple Products
Mobile computing security : 24 June, 2010
McAfee has released Apple tools for the iPhone, iPod and iPad enabling parents to have greater control over their children's online activity when using these devices
 
Sybase Now Support iOS 4 For Wider Mobile Terminal Security
Mobile computing security : 24 June, 2010
Apple mobile devices fall under the protection of Sybase Afaria with mobile device management and security
 
BlackBerry Secure Voice Calling Certification From Large Telecom Operator
Mobile computing security : 22 June, 2010
AT and T has provided approvals to Cellcrypt Mobile for BlackBerry enabling the software to be used by BlackBerry users across the telecommunications operator's wireless networks
 
Two-Factor Authentication For iPhones
Mobile computing security : 09 June, 2010
DoubleSec from DSwiss provides easy to use automatic two-factor authentication for iPhones using refreshed token stored on the device
 
Mobile Phone Security Advice For World Cup Fans
Mobile computing security : 09 June, 2010
Symantec is raising awareness levels of threats posed to world cup fans using mobile phones to stay abreast of events, offering advice on physical security and also in preventing becoming a victim to malware, phishing or other targeted exploits aimed at mobile users absorbed in the matches
 
First Option To Provide FireID Technical Support in the UK
Mobile computing security : 03 June, 2010
FireID forms partnership with First Option Technologies to provide UK support for the company's two factor authentication solutions
 
McAfee Buys Into SmartPhone Security Market
Mobile computing security : 27 May, 2010
By purchasing Trust Digital, McAfee enters the mobile security and management market and makes use of crossover technologies to meet the challenges of addressable endpoint security
 
iPad Security Breakthrough
Mobile computing security : 27 May, 2010
Enterprise users of the Apple iPad can now deploy the device among mobile users with confidence using OpenTrust Mobile for secure Authentication on the move
 
Police Handsets Protected With Kaspersky Mobile Solutions
Mobile computing security : 26 May, 2010
Arqiva's Police Mobile Data Solution has embedded cyber threat protection from Kaspersky Labs for use in handsets used throughout the UK police service
 
FIPS Certification for Cellcrypt
Mobile computing security : 21 May, 2010
Secure voice calling provider gains FIPS certification for the Cellcrypt cryptographic module
 
Free Secure VPN Gateway for iPad Users
Mobile computing security : 20 May, 2010
Astaro has extended its security gateway to provide mobile network access to iPad users at no charge
 
Partnership For Middle East Mobile Payments
Mobile computing security : 20 May, 2010
Jadarah joins Accumulate in distribution partnership to being mobile payment solutions to the Middle East and North Africa regions
 
Smart Phone Share Trading Uses Two Factor Authentication
Mobile computing security : 18 May, 2010
FireID has supplied Interactive Investor with the means to supplier its investors with 6-digit one time PIN access control with the Smart Phone acting as the physical token
 
Mobile Money Transfer Security Solution
Mobile computing security : 04 May, 2010
Joint project between Valimo Wireless and Trivnet brings improved security to mobile users wishing to perform money tranfers while on the move
 
Malware Protection for Android Smart Phones
Mobile computing security : 03 May, 2010
VirusScan Mobile from McAfee is now available for windows and android based smart phone mobile devices
 
Sipera Reaches Unified Communications Milestone
Mobile computing security : 30 April, 2010
Borderless UC brings security and compliance for IP Video, Voice over IP and Messaging unification
 
Blackberry Devices Systematically Ignored in Business Continuity Plans
Mobile computing security : 30 April, 2010
Research from Mimecast indicates that UK businesses are overlooking the growing use of BlackBerry services when putting together their business continuity contingency plans
 
BlackBerry Secure Calling Demonstration at WES 2010
Mobile computing security : 19 April, 2010
The Wireless Enterprise Symposium in Florida is being sponsored by Cellcrypt who will be demonstrating encrypted voice calling on BlackBerry smartphone devices
 
Mobile Security Becomes A Priority As Data Traffic Eclipses Voice Services
Mobile computing security : 29 March, 2010
AdaptiveMobile is reminding mobile users of the dangers of using unsecured mobile data services as the threat level increases with data service volumes overtaking voice traffic for the first time
 
Survey Reveals Poor Level Of Security For Corporate IPhone Users
Mobile computing security : 26 March, 2010
Businesses leave themselves exposed to data loss as many leave iPhone Security on the back burner despite high uptake levels of the mobile handset in the corporate environment
 
Mobile Payment Company Enters Swedish Hot Technology List
Mobile computing security : 26 March, 2010
Sweden's Technology Press recognizes accumulate with entry to hottest technology list for its mobile security and mobile payment solutions
 
Open Handset Alliance Gains Gemalto As New Member
Mobile computing security : 26 March, 2010
Gemalto to provide active contributions to the development of open platform mobile phone operating system as part of its membership of the OHA
 
Secure Code Development Necessity for Smartphone Apps
Mobile computing security : 12 March, 2010
Warning from Fortify focuses on the proliferation of smartphone applications and the need for secure code development practices to be applied to them to prevent serious data security vulnerabilities from arising
 
Spyware Vulnerability Warning on Smartphones
Mobile computing security : 12 March, 2010
Mobile phone applications could be used as vehicle for downloading spyware warns Veracode in the wake of high profile mobile phone stalking case
 
Mobile Phone Interception Leading To Millions Lost By Businesses
Mobile computing security : 04 March, 2010
The Ponemon Institute has conducted a survey for Cellcrypt on business call interception of mobile phones with concerns raised over business travellers and conference calls
 
Secure Mobile Corporate Desktop with Abra USB Appliance
Mobile computing security : 03 March, 2010
Check Point Software brings more scope to mobile users with a USB device enabling VPN connectivity, strong authentication and encrypted storage which allows secure use of corporate desktop environments whilst on the move
 
Secure BlackBerry Synchronisation to MS Exchange and Small Business Server
Mobile computing security : 02 March, 2010
BlackBerry Enterprise Server Express is a free tool for secure wireless synchronization of smart phones to Microsoft server platforms
 
Collaboration Develops 3G Application For Secure Wireless Transactions
Mobile computing security : 02 March, 2010
mIdentity 3G from Kobil provides mobile broadband connectivity combined with data and identity protection for mobile based transactions
 
Agreements on SmartPhone Point Of Sale Payment Systems
Mobile computing security : 02 March, 2010
Apriva has reached sales agreements on providing POS solutions for mobile merchant payments using a variety of smart phone systems
 
Mobile Financial Services Enabled by Gemalto SIM Security
Mobile computing security : 18 February, 2010
SIM based mobile transaction security from Gemalto is at the heart of a mobile financial services solution being implemented by MTN Middle-East and North Africa
 
Secure Blackberry Integration With Microsoft Exchange Server
Mobile computing security : 17 February, 2010
BlackBerry Enterprise Server Express is a free solution for companies requiring secure synchronisation between corporate smart phone devices and Microsoft's Windows Small Business Server or Exchange
 
Free 90 Day call security trial for BlackBerry users
Mobile computing security : 10 February, 2010
Attendees at the Blackberry smart phone stand at Mobile World Congress can gain access to Free 90 days of secure calling from Cellcrypt
 
Gemalto buys into Mobile Authentication
Mobile computing security : 05 February, 2010
With the acquisition of Valimo Wireless Oy, Gemalto gains expertise in two-factor authentication technology for mobile communications
 
companiestest Leave Vulnerable Users Exposed to Potential Voice Interception
Mobile computing security : 05 February, 2010
Voice Encryption Specialist discovers the extent of vulnerability of workers in sensitive departments to mobile phone communication intercepts
 
Secure Mobile Phone Payment Company Gains Injection of Capital
Mobile computing security : 28 January, 2010
Scandinavian PayEx has invested in Accumulate for the development of mobile phone based security and payment systems
 
Advanced mobile encryption foils call compromise attempt
Mobile computing security : 28 January, 2010
Securstar voice encryption not among the 12 mobile encryption products claimed to have been compromised by a blogger
 
Mobile encryption crack leaves up to 85% potentially exposed
Mobile computing security : 19 January, 2010
GSM and Kasumi encryption algorithms have been unravelled within the space of two months leaving the remaining secure encryption providers with a wide market for their technology
 
Two factor authentication for iPhone users
Mobile computing security : 19 January, 2010
Secovid Softtoken from Kobile Systems is a one-time password generator for mobile phones with iPhones now having been added to the list of mobile handset providers supported
 
GSM encryption flaws likely to result in significant risks
Mobile computing security : 07 January, 2010
Cracking voice encryption on mobile phone communications is becoming increasingly easy as criminals focus on alternative ways of extracting private information
 
Lack of encryption leads to celebrity smart phone data leak
Mobile computing security : 24 December, 2009
Lack of care in securing data stored on smart phones can lead to embarrassing and damaging loss of information as demonstrated in the recent Tiger Woods fiasco, according to CryptoPhone
 
Seasonal advice for Smart Phone Security
Mobile computing security : 23 December, 2009
Mobile security expert, Lookout provides Smartphone users with tips for keeping their data safe during the holiday season
 
Smartphone data security start-up launched with venture capital
Mobile computing security : 22 December, 2009
Mobile security company launches with the aim of protecting smart mobile devices from data loss, malicious software and hackers
 
Loss record at MOD requires a post-theft data destruction solution
Mobile computing security : 16 December, 2009
Absolute Software comments on the scale of laptop losses at the UK's Ministry of Defence and suggests the need for a solution which enables data to be wiped remotely in the event of losses
 
Solution for managing and security corporate data on mobiles
Mobile computing security : 16 December, 2009
Mobile device security from Symantec provides full security and management process for enabling companies to manage their inventory of mobile computing devices securely
 
Symantec advises caution with smartphones and laptops this Christmas
Mobile computing security : 11 December, 2009
With Smartphone sales reaching nearly 180 million this year, the data-packed devices are a prime target for thieves especially during the Christmas period when people's guards are down
 
Decrypt the conversation and pick up the gold
Mobile computing security : 08 December, 2009
Gold Lock has put out a challenge to break its encrypted mobile conversation to pick up a bounty in gold and a position in the company
 
Half of UK corporate laptops vulnerable to loss
Mobile computing security : 04 December, 2009
An e-mail survey from Check Point Technologies has revealed that over half of corporate laptops have no anti-virus protection or data encryption installed
 
Confidential information vulnerability during mobile phone discussions
Mobile computing security : 04 December, 2009
Cellcrypt has conducted a survey into business use of mobile phones for discussing confidential information and reveals extent of vulnerability to voice call interception
 
First | Prev  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo