
Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 24, 2016
Five BYOD disasters organisations can avoid with good planning
The ‘bring-your-own-device’ (BYOD) approach to business technology has many advantages. If done correctly, it can…

Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review
Apple’s official iOS App Store is well known for its strict code review of any…

New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
We recently discovered 22 Android apps that belong to a new Trojan family we’re calling…

Hewlett Packard Enterprise Identifies Top Risks for Businesses Today: Application Vulnerabilities, Patching and Malware Monetisation
Annual Cyber Risk Report reveals attack sophistication on the rise while organisations struggle to keep…