HTC, which just announced it would stick with Google and keep running Android on its best phones even though Google …


HTC, which just announced it would stick with Google and keep running Android on its best phones even though Google …

As our society mobilises and more individuals use smart devices to access corporate data, cyber criminals are developing more sophisticated …

Internet Explorer is better at defending against drive-by downloads than competitors’ browsers and the contest isn’t even close, according to …

A study from digital security company viaForensics paints a stark picture of the vulnerability of smartphone user data. viaForensics evaluated …

Cybercrooks are increasingly capitalising on the mass adoption of mobile devices by exploiting smartphone users at home or at work. …

Another finding has emerged from the Global IT Security Risks survey conducted by Kaspersky Lab in partnership with global research …

The IT security market in the Asia Pacific region except Japan (APEJ) was busy last year with security experts stepping …

While data breaches by hackers get headlines, another form of data leakage can be very damaging to a company’s bottom …

The biggest business challenge today, in the minds of many information security officers, is the stealthy online infiltration by attackers …

IT security and data protection firm Sophos has published its Mid-Year 2011 Security Threat Report. The report reveals that fake …

A new Android Trojan is capable of recording phone conversations, according to a CA security researcher. While a previous Trojan …

IT security vendor ESET Middle East has announced a special offer for organisations looking to secure their networks in the …

As personal and professional lives become more intertwined, employees are using their own consumer-grade tablets, smartphones and PCs for work …

In a recent IDC International Survey on security governance, risk, and compliance, IDC Energy Insights found that over 50% of …

Cybercrooks are increasingly capitalising on the mass adoption of mobile devices by exploiting smartphone users, at home or at work. …

The in-house reputation system used in Internet Explorer 8 and 9 is markedly superior at blocking social-engineering attacks than the …

Setting the stage for cloud deployments, VMware will update many of its core products and bundle them into an integrated …

Dubai Courts continues to invest in and grow its online presence as it works to expand and improve the services …

The Twitter account for Fox News was apparently hacked, with six tweets falsely reporting early yesterday morning that U.S. President …

Trend Micro has announced the public beta release of Trend Micro Titanium Maximum Security 2012. Customers who download the 2012 …