Cloud & mobile security – take aim, save the data

By Rob Bamforth, Quocirca. This article first appeared on http://www.computerweekly.com/blogs/quocirca-insights/. In all the hubbub around mobile users increasingly making their own choices of operating systems and hardware, something has been lost sight of - it doesn't really matter if you bring your own device (BYOD), a more pressing matter for businesses should be 'where is our [...]

By | December 15th, 2014|Categories: Contributed Articles, Mobile|Tags: , , |0 Comments

Secure Spaces integration with Blackphone give users unprecedented choice

Secure Spaces provides multiple virtual phone capability to Blackphone - Blackphone's Silent Space delivers the ultimate in private communications for users. OTTAWA, Ontario, Dec. 9, 2014 /PRNewswire-iReach/ -- Graphite Software announced today that the Blackphone will be updated to include Secure Spaces, adding the unique capability for users to create multiple separate spaces for apps, [...]

By | December 10th, 2014|Categories: Mobile, Security and Privacy|Tags: , , |0 Comments

The problem of buggy software components

By Bob Tarzey, Quocirca. This article first appeared on http://www.computerweekly.com/blogs/quocirca-insights/. What do Heartbleed, Shellshock and Poodle all have in common? Well apart from being software vulnerabilities discovered in 2014, they were all found in pre-built software components, used by developers to speed-up the development of their own bespoke programs. Heartbleed was in OpenSSL (an open [...]

By | December 8th, 2014|Categories: Contributed Articles, Security and Privacy|Tags: , |0 Comments

A New Brochure Highlights Security Advantages of Smart App Lock

The application gives users enhanced control over their personal data. SAN JOSE, Calif., Nov. 20, 2014 /PRNewswire-iReach/ -- A recent publication from SpSoft, the makers of the remarkable security app, showcases some of the unique benefits to mobile device users.  Now that the app is optimized for Intel® Atom™ processor-based Android* tablets, the Smart App Lock tool [...]

By | November 24th, 2014|Categories: Apps, Mobile|Tags: , , , |0 Comments

Ecoh Allows Parents to View Children’s Surroundings With Wearable Outward Facing Video Camera

The wearable safety and telecommunication device that gives parents peace of mind and children freedom to play is currently crowdfunding on Indiegogo. MELBOURNE, Australia, Nov. 11, 2014 /PRNewswire-iReach/ -- Ecoh, a wearable safety and telecommunication device, is currently crowdfunding on Indiegogo in hopes of raising$100,000 for product tooling and manufacturing. Ecoh has been designed to be simple and functional, [...]

By | November 14th, 2014|Categories: Apps, Security and Privacy|Tags: , , , |0 Comments

OS X and iOS Device Owners – Read This Now – Beware Of WireLurker

In the past, Apple device owners enjoyed a rather safe experience with their Macs and iOS devices. Any viruses or intrusions were relatively trivial, couldn't spread, and were dealt with very quickly. Unfortunately, this is no longer the case. Researchers at Palo Alto Networks published a research paper about a new threat called WireLurker, which [...]

By | November 6th, 2014|Categories: Apps, Security and Privacy|Tags: , , , , , , |0 Comments

Why Should I Rent Anti-Virus Software?

Did you know there are approximately 28,000 new malware threats introduced to the web every single day?  Rapid growth of technology presents the opportunity for the development of a wide range of new viruses distributed to attack our systems in ways unrecognizable to anti-virus software packages.  Such rapid landscape changes make it difficult for traditional [...]

By | November 5th, 2014|Categories: Featured Post, Security and Privacy|Tags: |0 Comments

Android: The New DDoS Launchpad?

Igal Zeifman from Incapsula has shared a very interesting article with us about hackers turning to Android devices as a new way to create DDoS attacks. We in turn wanted to share this with our readers.   Distributed denial of service (DDoS) attacks use computers distributed across the Internet to clog a network connection or [...]

By | November 4th, 2014|Categories: Featured Post, Security and Privacy|Tags: , , , |0 Comments

Which popular smartphone app is stealing your personal information?

Bret Baier from Fox News talks to cyber-security expert, Gary Miliefsky of SnoopWall, about a popular type of smartphone app that steals your personal information.  The top 10 apps in this category all appear to have malicious malware.  The full SnoopWall report and a free flashlight app that won’t spy on you can be downloaded [...]

By | October 30th, 2014|Categories: Mobile, Security and Privacy|Tags: , |0 Comments

eBook – The Top 10 DDoS Attack Trends

Today we've added an eBook from Incapsula. Download it to learn about the top 10 DDoS attack trends.. Title eBook - The Top 10 DDoS Attack Trends Introduction The volume, size and sophistication of distributed denial of service (DDoS) attacks are increasing rapidly, which makes protecting against these threats an even bigger priority for all [...]

By | October 27th, 2014|Categories: Security and Privacy|Tags: , |0 Comments
Translate »