Mobile

Mobile | News, how-tos, features, reviews, and videos


screen shot 2018 09 21 at 10.43.22 am

Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted.

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

template c100.00 00 02 14.still002
video

Mingis on Tech: How real is UEM for mobile management?

The promise of unified endpoint management is that it allows companies to more easily handle mobile (and even desktop) hardware management. But it's going to take a while for it to become reality.

facial recognition access identification biotech

Why you shouldn’t use your face as your password

You can now use your face to lock your smartphone. But just because you can doesn’t mean you should.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

credit cards

Hack mobile point-of-sale systems? Researchers count the ways

Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.

template c100.00 06 06 01.still001
video

Wi-Charge demos wireless charging over distance

The ability to charge hardware over distances of several meters has always seemed to be something of a pipe dream. But Wi-Charge says the technology works – and actual product shipments could begin early in 2019.

mobile security / unlocked data connections

Does your security solution protect against GDPR non-compliance?

Despite a seemingly complete overhaul of data security and privacy as the General Data Protection Regulation rolled out, many fall short when screening for compliance. How do you protect your organization, your clients and your...

deleting facebook

Facebook gave access to data on users and their friends to 60 device makers

Facebook may have violated a settlement with the FTC and promises made to users, as well as lied to Congress over giving users' complete control of their data.

Anonymized identity

The Pentagon has a project that aims to verify identity via smartphone

A Pentagon-funded project that aims to add tech to verify identity and ultimately to assign a “risk score” to you could be included in new smartphones within two years.

group chat services - Telegram

What is Telegram and is it secure?

The Telegram messaging app has grown in popularity since its launch in 2013, but not without controversy.

cwan 011 blockchain
video

What is blockchain technology?

Cryptocurrency such as Bitcoin has garnered most of the media coverage and hype to date, but keep your eye on blockchain – this new technology is poised to change IT in much the same way open-source software did a quarter century ago....

sequence 01.01 01 24 07.still001
video

CIO Leadership Live with Jack Clare, CIO and chief strategy officer at Dunkin' Brands | Ep 9

In this episode of CIO Leadership Live, host Maryfran Johnson talks with Jack Clare, CIO and chief strategy officer at Dunkin' Brands, about the company's mobile payment, ordering and loyalty apps, and how it's striving to improve...

Will LaSala
video

Defending against mobile technology threats | Salted Hash Ep 24

What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and...

iphone fingerprint 5s

Cops go into funeral home, attempt to unlock phone with dead man's fingerprint

Florida police entered a funeral home and attempted to unlock an iPhone using the dead man's fingerprint.

phishing man with life saver sinking danger helpless

The rise of mobile phishing attacks and how to combat them

Find out why phishing is starting to focus on mobile devices...and what you can do about it.

mobile security stock image one bad device

Don’t rush to deploy 5G if you want IoT security, agency warns

Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency.

sequence 01.00 00 06 24.still001
video

Mingis on Tech: What's up with wireless charging?

With Apple embracing the Qi standard in the iPhone X and 8/8+, wireless charging is finally becoming more mainstream. But there's an ongoing debate about what it does to smartphone battery life.

mobile security threat detection

Keep your mobile workforce safe: understand the threats

As you review your mobile security strategy, make sure the solutions you choose shield devices from infected apps, man-in-the-middle attacks, OS exploits, malicious links in SMS messages and other exploits.

Load More