Predictions from PandaLabs

Panda-Labs-security software-predictions

PandaLabs has long been one of the most trusted names in computer security, providing reliable cloud-based protection to both enterprises and individuals for a generation. Used as a model for multiple similar cloud-based startups over the last decade, the venerated Panda security suite remains one of the most-downloaded anti-viral and anti-malware suites in existence, and [...] Read more »

Data Protection During the holidays

Key with christmas tree

The Holiday season is upon us, and most people will spend significantly more time traveling over the next month than they did for the rest of the year. The hours spent in airports on the way to visit family, friends, and loved ones, as well as massive increases in online shopping, both ramp up the [...] Read more »

BYOD Implementation: A Primer

BYOD mobile security

Bring Your Own Device – rarely in history has there been a string of four words that strikes so much fear and anxiety into the heart of dedicated IT security managers everywhere. BYOD policies are increasingly common across the corporate landscape. Companies both foreign and domestic have weighed the costs of purchasing new devices and [...] Read more »

Diverging Paths on Mobile Security

mobile device security

In a recent press release, Gary Kovacs, the new CEO of global security software company AVG, pinpointed the root cause of a great many security issues concerning mobile device technology. As the former head of Mozilla, Kovacs is not averse to shaking up industry expectations and unapologetically pointing fingers. True to form, the picture Kovacs [...] Read more »

iPhone Forensics

Today’s article is a guest submission from the INFOSEC Institute, and it details how to perform iPhone forensics – which means pulling data from an iPhone. Although the article contains very detailed instructions on performing forensics on an iPhone, we think it is an extremely interesting read, even for those that do not have any [...] Read more »

Mobile Security in the New Year

Last week we talked about upcoming threats in the IT security industry – new types of exploits and intrusion methods we’re likely to see in larger numbers in the upcoming calendar year. This week, in something of a related story, we take a look at upcoming threats to the mobile device market, and consider a [...] Read more »

Mobile Payments – Yes or No?

A new trend in the tech industry, mobile wallets are increasingly popular with users who prefer the convenience and flash of using smart mobile devices to make and accept monetary transactions. While the technology certainly exists to implement mobile payments across a wide range of industries – Google and iPhone both offer a plethora of [...] Read more »

Mobile Phone Data Lost at Olympics to Break Records

Instead of now dreaming of gold medals, CISOs are having Olympic nightmares. According to Vefafi, an estimated 67,00 mobile phones are likely to be lost or stolen in London this summer.  That is a step up (although amazinging not much) from the typical 50,000 mobile phone NORMALLY lost in London over a 2 week period.  [...] Read more »

FCC to Stop Smartphone Theft Via National Database

With the ever-increasing amount of smartphone usage in the United States and the rising number of thefts of these phones, the Federal Communications Commission (FCC) is devising a plan to stop the rising problem of cell phone theft. The FCC in conjunction with local police departments and the wireless phone industry has released the preliminary [...] Read more »