From the developer: ""SMSAuthenticator is an open source authentication module for situations where 'username and password'-login...
Showing results 1 to 20 of 1,089
The Egg is a webserver; a storage device; a Wi-Fi hotspot; and, maybe, a security service. It makes the "mobile" Internet a reality: it fits in your pocket and runs all day on batteries.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features.
A collection of notable security news items for the week ending January 23, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
A collection of notable security news items for the week ending January 2, 2015. Covers enterprise, controversies, reports and more.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Is there a mobile privacy crisis? Symantec thinks so and has added features to Norton Mobile Security to save you from it.
Nokia has opened the doors to a new mobile security hub in the German capital.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
Want to avoid having your online accounts hacked? Enable two-factor authentication (2FA), a crucial security measure that requires an extra code when signing in from an unfamiliar device. In this post, I explain how to use a mobile app to make your accounts safer.
Red Hat's latest acquisition enhances its mobile app development platform with collaboration features that promote agility and increase security.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
A new index from the mobile security provider also suggests that iOS has regained its enterprise share from Android, accounting for 69 percent of enterprise device activations.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
U2F is Universal 2nd Factor, the first FIDO Alliance standard for two-factor authentication. The goal: simple systems to combat phishing and other credential breaches.
The Samsung Knox team boss tells how it all got started and how the Korean tech giant wants to evolve its touted mobile security solution for the global mobile workforces of today, reports ZDNet Korea's Cho Mu-hyun.
The mobile security provider says the platform eliminates security headaches by giving mid-market businesses a central location to access business apps.
Blackphone and communications security firm Silent Circle are offering hackers US$128 per security-related vulnerability found in its mobile operating system and associated platforms in a new bug bounty program.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 Hands-on with Windows 10: Installing the latest Technical Preview
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)