<
>

Posts in Mobile & Wireless

Cybersecurity a Shared Fate Within Every Aspect of Businesses – IBM Security Virtual Summit 2020

With the continuous expansion and changes in the digital landscape today, organisations are compelled to accelerate their recovery and transformation plans in adapting to the consequences of the...

Huawei 5G Passes GSMA’s Network Equipment Security Assurance Scheme

Huawei's 5G wireless and core network equipment (5G RAN gNodeB, 5G Core UDG,UDM,UNC,UPCF) and LTE eNodeB has passed the GSMA’s Network Equipment Security Assurance Scheme (NESAS). GSMA...

Are You Following the Top 10 Software Security Best Practices?

By: Tommi Makila, Senior Solutions Architect at Synopsys Software Integrity Group  Each and every company’s security needs are unique and ultimately the practices and policies...

Too Boring to Hack? A Third of Millennials Think They’re Too Mundane to be the Victim of Cybercrime

Online security tops the charts as the most important factor for millennials looking to find their ‘Digital Comfort Zones’ at home, despite the fact that over a third of them (37%) think...

Visa Sees 10 Million Asia Pacific Small Businesses Participate in its Global Program to Spur Recovery Through Digital Commerce

Visa announced a commitment to support 10 million small businesses across Asia Pacific in an effort to get local communities back to business in the wake of the COVID-19 pandemic. Visa is introducing...

Kaspersky Reviews Password Stealers That Target Major Gaming Services

Gaming platforms represent an industry with a multi-million user audience. Cybercriminals are fully aware of this, utilising various types of malware to profit from gamers. Kaspersky reviewed...

Bearing Full Responsibility for Digital Services that Customers Can Trust

As the demand for digital services increases for banking and Financial Service Industries (FSIs), providing a secure service and environment for customers is a prerogative which banks and FSIs cannot...

How to Secure Remote Access for Your Employees

Remote access is by no means a new concept. For years, businesses have relied on technologies such as Virtual Private Network (VPN) and Virtual Desktop Infrastructure (VDI) to enable employees to...

Tips on How to Fend Off Dangerous Phishing Emails

The COVID-19 pandemic is not totally over, but shelter-in-place orders gradually are. Many countries in Southeast Asia are gradually lifting their different forms of lockdown starting this month....

May 2020’s Most Wanted Malware: Ursnif Banking Trojan Ranks On Top 10 Malware List for First Time

Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd., a leading provider of cyber security solutions worldwide, has published its latest Global Threat...

Pages

Subscribe to RSS - Mobile & Wireless