article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops.

Mobile 135
article thumbnail

Google wants you to help build its Fuchsia operating system

Venture Beast

Google today announced that Fuchsia, its open-source operating system is welcoming contributions from the public. The company is expanding Fuchsia’s open source model to make it easier for public engagement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Government Employees at High Risk for Mobile Phishing

SecureWorld News

New research from Lookout reveals the most common mobile threats aimed at federal, state, and local government agencies and their employees—all of which have increased since 2021. The report from Lookout, an endpoint to cloud security company, used the Lookout Security Graph to analyze data specific to government agencies at all levels.

article thumbnail

Apple settles copyright dispute with iPhone emulation software company

TechSpot

Corellium makes a product that allows users to virtualize mobile operating systems in a desktop browser. The software is used for various purposes, including app development, security testing, and security research.

Software 112
article thumbnail

Google’s failure to quash EU antitrust ruling has broad implications for tech companies

Computerworld Vertical IT

billion) for antitrust violations could have wide-ranging implications for other tech companies. The case dates back to 2018, when the EU’s competition chief, Margrethe Vestager, issued a ruling that Google used its Android mobile operating system to undermine competitors.

Company 71
article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO Business Intelligence

Attackers use deepfake ID documents to fool KYC processes or inject deepfake photos and videos to spoof facial biometrics systems. A prime example is the recent attack that injected an AI deepfake video feed to defraud a Hong Kong company for $25 million. Artificial Intelligence, Security

Security 105
article thumbnail

DOJ suit over Apple iPhone cites failures of Amazon Fire Phone and Microsoft Windows Phone

GeekWire

Justice Department’s landmark antitrust lawsuit Thursday morning against Apple, which accuses the company of illegally maintaining an iPhone smartphone monopoly, reads at times like a technology history lesson. Amazon founder Jeff Bezos announces the Fire Phone in June 2014. GeekWire File Photo / Todd Bishop) The U.S.

Apple 115