ChannelLifeAustralia
Industry insider news for Australia's technology resellers
  • Login Register

Results:

Mobile security

These search results are from across the Techday network of sites
Story image
31 Oct
How SMS became the trusted mode of customer communications
About 90 percent of text messages are read within three minutes of receipt and we’re seven times more likely to respond to a text than an email. More
Story image
11 Sep
Apple issues clarification on extent of iOS malware infection
The attack affected fewer than a dozen websites that focus on content related to the Uighur community. More
Story image
10 Sep
Security flaw left Android phones open to SMS phishing attacks found
Check Point Research discovered the vulnerability impacts phones from Samsung, Huawei, LG, and Sony.More
Story image
21 Aug
The dark side of apps: Security threats on the rise
"Think about it, unsecured Wi-Fi, spoofing, phishing attacks, ransomware, spyware... mobile devices make for the perfect target."More
Story image
28 May
CrowdStrike: Best practices for mobile device security
The workforce is more reliant than ever on business-critical applications, which can access confidential information from multiple devices at any time and anywhere. More
Story image
21 May
Tenable leverages partner ecosystem with new integrations
Tenable has introduced 19 new technology integrations to its Cyber Exposure Ecosystem on an open platform in a bid to better protect against security risks.More
Story image
06 Mar
CrowdStrike announces endpoint detection for mobile devices
The workforce is more reliant than ever on business-critical applications, accessing confidential information from multiple devices anytime, anywhere. More
Story image
28 Feb
Sophos Mobile Security now integrates Microsoft Intune
In the case of a threat or compromise, intelligence insights can help administrators decide when to lock down an individual endpoint and deny access corporate data.More
Story image
27 Feb
GlobalSign, Microsoft join forces to strengthen mobile security
This provides greater assurances that the identity in the certificate matches the identity associated with the Intune policy set forth for the device/user. More
Story image
18 Feb
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.More
Story image
08 Feb
Security and mobility app adoption increasing - Okta
The fastest-of-the-fastest growing apps focus on identity-driven security, indicating that companies are taking Zero Trust seriously. More
Story image
01 Feb
Achieving uncompromising security without compromising privacy
This is an age where it is critical to achieve comprehensive cybersecurity without invading users’ privacy, hindering their mobility, or impeding their efficiency. More
Story image
06 Dec
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.More
Story image
05 Dec
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019. More
Story image
03 Dec
The three principles of effective data management
"Data has become big business, creating massive revenue streams for those who can understand it."More
Story image
03 Dec
GDPR and backup – balancing business continuity and data protection
It’s over six months since the implementation of the General Data Protection Regulation (GDPR) and we’re now at the in-between phase. TMore
Story image
03 Dec
SMS phishing scam sweeps Australia
"SMS is an easier way for scammers to pretend they are sending from a well-known business that people know and trust."More
Story image
30 Nov
Microsoft comments on recent tech support scam crackdowns
Despite the crackdowns, Microsoft warns that these scams persist and target everyone, no matter their age or location.More
Story image
29 Nov
How to combat human error in cyber risks
It’s an old adage in security that people are the weakest link – mostly because of human error.More
Story image
29 Nov
Uber disguised breach ransom payment as a bug bounty reward
“Paying the attackers and then keeping quiet about it afterwards was not, in our view, an appropriate response to the cyber attack."More
Story image
29 Nov
HID Global brings high authentication to mobile
The company’s new offering brings the security of physical authentication to Android and iOS with near-field communication technology.More
Story image
28 Nov
NZTech to launch new digital identity organisation
“We are the country’s newest not-for-profit organisation, bringing together private and government organisations working to make digital identity easier and more secure."More
Story image
28 Nov
Norton VPN adds New Zealand server
The new local server will help users protect personal information and securely access private information while on the go.More
Story image
28 Nov
Check Point announces general availability for CloudGuard SaaS
CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email.More
  • 1
  • 2
  • 3
  • Next ›
ChannelLifeAustralia
Industry insider news for Australia's technology resellers
Follow us
  • Subscribe
  • LinkedIn
  • Twitter
  • Facebook
  • RSS
About us
  • Advertise
  • Media kit
  • Our sites
  • Our team
  • Frequently asked questions
  • Our terms
  • Contact us
  • Our Australian sites
  • CFOtech
  • ChannelLife
  • DiversityWatch
  • FutureFive
  • IT Brief
  • SecurityBrief
© 2019 Techday Ltd, All rights reserved. Dedicated Servers powered by HD