Available through Loophold, the free Mobile Connect app provides network-level access to corporate resources over encrypted connections.
Today's information security products are trustworthy, but the processes around information security are fallible, says Performanta.
Vulnerabilities in Android devices and applications pose a potential threat to users` security, says Tyrone Erasmus, MWR InfoSecurity information security consultant.
New vulnerabilities are revealed in SHA256, says Absa information security researcher Frans Lategan.
Hackers expose vulnerabilities in SAP GUI apps in order to steal information.
This year could see more cyber attacks on critical infrastructure and information security leaks, says cyber expert.
A lack of skills is hampering the ability to address cyber warfare effectively, says cyber security expert.
Moxie Marlinspike and Kenneth Geers will discuss trust, security breaches and cyber espionage at the ITWeb Security Summit 2012.
Recent compromises of supposedly secure technologies are an indication that IT security needs more attention, says SensePost Security.