Get the most from your connected world on every device you own.

Loading video ...
  • Your hotel room can be hacked with a ‘dry erase marker’

    One of the nice things about traveling is staying in a hotel—assuming you pick the right hotel. You get a nice comfy bed, perhaps some free breakfast in the morning, and people to come in and tidy up everyday. One thing you probably don’t expect, though, and wouldn’t appreciate, is having an unauthorized visitor enter your room while you’re not there.

    Dry Erase Marker
  • Authentication takes center stage for mobile device security

    Imagine that your smartphone is lost, or your tablet is stolen. Aside from the cost of the device itself, what else is at risk? How much sensitive personal data do you have stored on your smartphone or tablet?

    Of course you have sensitive information stored on your mobile device. One of the primary benefits of carrying the mobile device in the first place is to have that information at your fingertips. That isn’t the real issue, though. The $37,000 question is, “What protection do you have in place to ensure unauthorized users can’t gain access to your sensitive information?”

  • The Risky Business of Mobile Social Media

    Everything you never wanted to know about your vulnerability to identity theft can be found on the first page of search results for “Facebook hack.” If you’re like most people, you probably don’t like to think about the many times a day your personal and financial data are exposed to risk over mobile devices, even as you erect firewalls and scan for viruses on your laptop. Something about the ease of using a smart phone allows us to momentarily brush aside the risks of accessing social media on an unsecured device.

  • Mobile devices are the new frontier for botnets and DDoS attacks

    Pop quiz: What has a dual or quad core processor, gigabytes of potentially sensitive data, and very fast Internet connectivity? The default answer is “a PC.” But, if you responded with “smartphone” or “tablet” you would also be correct—and that blurred distinction is not lost on cyber criminals.

    The big difference between traditional PCs and mobile devices is that PCs are almost universally equipped with firewall protection and some sort of antimalware defense to guard against attacks, while mobile devices are often left defenseless. Users are conditioned to the constant threat of attack on PCs, but many fail to realize that a smartphone or tablet is just a smaller, more portable computer.

  • Staged cyber schemes may help shore up 'weakest link'

    Your PC is locked down with a strong, complex password when not in use, and your mobile devices are secured with a passcode. You have a cross-device security tool in place on your PCs and mobile devices to block unwanted traffic, prevent compromise from malware attacks, and protect your sensitive data. Even with the best of the best security measures in place, though, there’s still an Achilles heel that trumps it all—you.

    Think of it like your house. You can have bars on the windows, and industrial-strength