A new survey highlights how IoT and wearable technology adoption vary by age.
A UK financial institution has put together an interactive guide to online fraud and identity theft, along with links to tips and guidance to avoid being a victim.
The technologies behind Apple Pay, from encryption to one-time tokens to Touch ID, all help remove vulnerabilities in the current point-of-sale process.
The launch of iOS 8 is less than two weeks away, and these two features will be all the reason you need to install the new OS ASAP.
There are four new security bulletins from Microsoft this month, including one Critical update that addresses a zero-day flaw in Internet Explorer currently being exploited in the wild.
F-Secure's latest Threat Report highlights concerns that the force behind CryptoLocker ransomware was disabled but not destroyed.
Citrix ShareConnect enables users to access, view, and edit files from their desktop PCs from an iPad or Android tablet while on the go.
A new survey from Kaspersky Lab shows some concerning trends when it comes to securing and protecting business data on mobile devices.
Celebrity iCloud accounts have apparently been compromised, but that doesn't mean iCloud itself is to blame.
Microsoft is late to a game already owned by iOS and Android, but affordable Windows tablets could shift things in Microsoft’s favor.
Rumors are circulating that Apple is working on a larger iPad to launch in 2015, but it will take more than a bigger screen to make it a hit with business users.
A new survey from Kaspersky Lab finds most consumers believe banks, online retailers, and payment systems are responsible for safeguarding their financial data.
A Kaspersky Labs researcher hacked his own home and found a number of serious security concerns.
The latest Mobility Index Report from Good Technology reveals trends in how businesses are adopting and deploying mobile devices and apps.
The two-factor authentication used to “protect” your accounts is often insecure itself and poses a weak link that can be exploited by attackers.