158 articles
This week Kaspersky Lab announced a strategic partnership with Vertu, the manufacturer of luxury mobile phones. Thanks to the agreement between the two companies, all users of Android-based Vertu smartphones
The solution contains a number of functions with similar names that can be somewhat confusing. In this case we are talking about Mobile Device Protection (part of Mobile Device Management)
On the web you can find regular discussions about how people used to live without mobile phones. Somehow people lived without them until quite recently, but now it seems unimaginable.
The number of IT security incidents involving smartphones and tablets is on the rise, and most companies have no plans to limit the use of personal mobile devices for work-related
MDM systems are often not necessary right away for companies with a small number of mobile workers, whose managers often believe their IT-department can handle it effortlessly. But a reality
A modern man cannot imagine his life without mobile devices like smartphones and tablet computers. A portable minicomputer that provides access to the Internet and offers basic features for processing
Everyday millions of computers solve the same problem; these machines try to check if you are actually you and not some other person. The most popular tool to do that
The rapid development of the smartphone and tablet market has gone hand-in-hand with an alarming growth in the number and variety of threats targeting these devices. We have a single
On July 31st at the Black Hat conference in Las Vegas, Security Research Lab’s (SRL) Karsten Nohl presented research on the SIM security flaw. Nohl experimentally demonstrated the vulnerability, which
It was predicted, it was feared, and the day has come. An Android Trojan that has the ability to steal money from bank accounts has emerged in Russia. We have
If you haven’t heard by now, three days before Jay Z released his most recent album “Magna Carta… Holy Grail” in July, Samsung Galaxy device owners could download it via
The summer months are here and that means it’s vacation season. Whether you’re booking a weekend getaway to the nearest beach or traveling overseas to visit an unexplored country, your
Summer is a great time for vacation for everyone but criminals, for whom it’s among the busiest times of year. That’s because travelers make for easy marks, and their high
It’s summer, that time of year where we go on vacation, take lots of pictures — and, of course, upload them to Facebook, Instagram and Twitter. And because we want
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
If there’s one group of people who love vacation more than the vacationers themselves, its thieves. Tourists and travelers have always made easy marks for criminals, but now that everyone
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs
There’s been something of an uneasy consensus among experts that Apple’s iOS platform is the most secure option among mobile operating systems almost exclusively because of the closed-off nature of
The owners of smartphones running Android and iOS sometimes enter into heated discussions as to whether it’s worthwhile to perform the mysterious procedures known as rooting and jailbreaking their devices.
We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mobile platforms