System Security = hacking into laptop
ad hoc computer to computer software for windows, can it really extract data from my mac by a entity, using as a location marker the laptops antenna and serial numbers. I’ve heard of NT users having...
View ArticleBlock RIM users from accessing Corp email via BIS on personal BlackBerrys
I’m having a problem with my users accessing Corp. email by creating a BIS account on a personal RIM device. For security reasons I need to block this some how. I understand that there is a way to...
View ArticleWhat kind of mobile device restrictions do you have in your organization?
With the popularity of a diverse range of mobile phones and devices, many organizations have set strict policies and restrictions on the mobile devices employees are allowed to user for work. Whether...
View ArticleMobile spyware
Good afternoon, I would like to ask if the mobile softwares that filter the sms and calls on white lists & black lists are a spyware that could attack my privacy. Softwares like Mcleaner &...
View ArticleMobile encryption / security
I’m looking for companies developing next generation mobile security and encryption. Any suggestions? Thank you, Matt
View Article