Growing Your Business: Millennials and M-Commerce

Growing Your Business: Millennials and M-Commerce

Millennials are the largest generation in the U.S. labor force—a position they’ve held since 2016—and they’re involved in the majority (73%) of B2B purchasing decisions. Raised in the age of the Internet, ...
Cybersecurity for the Business Traveler: A Tale of Two Internets

Cybersecurity for the Business Traveler: A Tale of Two Internets

Many of us travel for work, and there are several factors we take into consideration when we do. Finding the best flights, hotels and transportation to fit in the guidelines of compliance ...
Online Security Concerns Split UK Black Friday Shoppers

Online Security Concerns Split UK Black Friday Shoppers

Shopping online on Black Friday Weekend can be a great way of getting the best deal as retailers slash prices across their range. But as security risks mount and hackers continue to ...
(More) Common Security Mistakes when Developing Swift Apps – Part II

(More) Common Security Mistakes when Developing Swift Apps – Part II

In my post last week I shared common security mistakes developers make when building Swift applications – covering insecure data storage, symmetric key algorithms, insecure communication and more. If you haven’t read ...
Common Security Mistakes when Developing Swift Applications – Part I

Common Security Mistakes when Developing Swift Applications – Part I

Overview: Data Storage and Communication Security Swift was first introduced in 2014 at Apple’s Worldwide Developers Conference (WWDC) as the iOS, macOS, watchOS and tvOS de facto programming language. Designed by Chris ...
Mobile Sites Can Be Abused to Leak Sensitive Sensors Data

Mobile Sites Can Be Abused to Leak Sensitive Sensors Data

A team of security researchers has uncovered that mobile sites can be abused to leak sensitive sensors data. The report called “The Web’s Sixth Sense” reveals the privacy implications and how exactly ...
Protecting Data on the Move

How to Protect Data in a BYOD World

Every day, more and more corporate information is moving to employees' personal devices. This rise of BYOD (bring your own device) provides increased flexibility and productivity to employees and, consequently, the organizations ...
How to detect and remove a virus from your Android phone | Avast

How to detect and remove a virus from your Android phone | Avast

Previously in Part 1 of The Avast Guide to Android Apps, we covered all the common malware and how to deal with it. In part 2 of our ongoing series, we take ...
IoT, 5G Networks and Cybersecurity: Safeguarding 5G Networks with Automation and AI

IoT, 5G Networks and Cybersecurity: Safeguarding 5G Networks with Automation and AI

By 2020, Gartner says there will be 20.4 billion IoT devices. That rounds out to almost three devices per person on earth. As a result, IoT devices will show up in just ...
Modern Authentication Methods and How They Enhance User Security

Modern Authentication Methods and How They Enhance User Security

It’s not a secret that modern apps often become a target of cyberattacks. Gartner reports that 95% of web applications experience attacks because of stolen user passwords. This means a set of ...
Loading...