+1-888-690-2424
  • Playing in the Digital Sandbox: Mobile versus Desktop Security

    Mobile operating systems consume resources from unknown sources on the Internet all the time, and yet they are not infected in the same manner as desktop operating systems. Certainly, sideloaded malicious Android apps are able to access parts of a mobile device that the user has authorized (e.g., pictures, contacts, SMS).  We have also seen flaws in mobile browsers that

        in Malware, Mobility
    0
  • Playing in the Digital Sandbox: Balancing System Trust

    On a daily basis, most people using desktop operating systems consume resources and ‘rich content’ from unknown sources on the Internet, typically via technologies ‘under the hood’ of our Web browsers.  These include Java, browser plugins like Adobe Flash, PDF readers, HTML5 and others. All are meant to create a rich and seamless user experience. Consider some scenarios that a

        in Identity Assurance, Malware
    0
  • Mobile Malware — Will it Expand in 2014?

    Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:”Calibri”,”sans-serif”; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass.  More and more enterprises are leveraging mobile to share information,

        in General, Malware, Mobility
    0
  • Digital Certificates: How they Secure Consumer-Level Devices, Identities

    The modern home is connected to the online world today more than ever. Now, everything from toaster ovens to toilets are IP-enabled. The phenomenon is called the Internet of Things, and we are currently starting to see the beginning of a massive worldwide adoption of it.  What can Digital Certificates Protect? • Gaming consoles • Thermostats • Set-top TV boxes

        in Digital Certificates
    0
  • Mobile Malware — Will it Expand in 2014?

    Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:”Calibri”,”sans-serif”; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass.  More and more enterprises are leveraging mobile to share information,

        in General, Malware, Mobility
    0
  • Digital Certificates: How they Secure Consumer-Level Devices, Identities

    The modern home is connected to the online world today more than ever. Now, everything from toaster ovens to toilets are IP-enabled. The phenomenon is called the Internet of Things, and we are currently starting to see the beginning of a massive worldwide adoption of it.  What can Digital Certificates Protect? • Gaming consoles • Thermostats • Set-top TV boxes

        in Digital Certificates
    0
Page 1 of 212