Apple also claims to have foiled US$1.5 billion worth of potentially fraudulent transactions Apple…
Mobile Security
-
-
Mobile SecuritySecurity
How does certificate-based authentication work?
by Aaron Wolandby Aaron WolandCertificate-based authentication is a cryptographic technique that allows one computer to securely identify itself…
-
The malware sends automated replies to messages on WhatsApp and other major chat apps…
-
The malware can grab login credentials for more than 450 apps and bypass SMS-based…
-
Marc Andreessen had it right – software has eaten the world. As a result,…
-
Mobile SecuritySecurity
Clubhouse app raises security, privacy concerns
by Terena Bellby Terena BellSocial media app Clubhouse has been on the market for less than one year…
-
Mobile SecuritySecurity
8 mobile security threats you should take seriously
by JR Raphaelby JR RaphaelMobile security is at the top of every company’s worry list these days —…
-
Mobile SecuritySecurity
Wormable Android malware spreads via WhatsApp messages
by Amer Owaidaby Amer Owaida“Download This application and Win Mobile Phone”, reads the message attempting to trick users…
-
Using a zero-click exploit, an attacker could have taken complete control of any iPhone…
-
Application SecurityCloud SecurityData BreachEmail SecurityFeaturedMobile SecuritySecuritySecurity Tools
Office 365 Encrypted Email
by Benjaminby BenjaminMicrosoft Encrypted Email Security is an essential component of business communication. Businesses look for…