Motorola Solutions unveils MC45 mobile computer
Motorola Solutions believes workplaces will find value in rugged handheld mobile computers that cost several times more than consumer-focused smartphones, but lasts much longer.
Motorola Solutions believes workplaces will find value in rugged handheld mobile computers that cost several times more than consumer-focused smartphones, but lasts much longer.
A mobile security technology proposal drafted by the National Institute of Standards and Technology (NIST) is being soundly rejected by one of the main trade groups representing a broad cross-section of industry.
Good Technology announced Good Vault, a system for adding two-factor authentication to the iPhone 4 and 4S for access to Good for Enterprise email.
Which is more secure, mobile devices based on Google Android or Apple iOS? It's not just a theoretical question to IT professionals making decisions about the future use of smartphones and tablets in the enterprise.
A novel technique based on MapReduce could let hackers hijack computing resources used by cloud-based mobile browsers and use them anonymously, according to security researchers from North Carolina State University and the University of Oregon.
Researchers at the University of South Carolina have discovered that some types of electricity meters broadcast unencrypted information that eavesdroppers could use to determine whether a home is occupied or not.
About 200 Android applications currently hosted on Google Play create spoofed SMS messages on the devices they are installed on, according to security researchers from antivirus vendor Symantec.
A researcher at North Carolina State University has uncovered a vulnerability that could be exploited to send deceptive text messages from some Android devices, as part of a phishing scheme.
A team of researchers from two German universities has released a study asserting that many of the most popular free apps available through the Google Play store may be vulnerable to man-in-the-middle attacks -- seriously threatening user privacy.
Whether you were looking for ways to be better at your job, seeking advice for making mobile devices safe and efficient within the enterprise or brushing up on Facebook privacy, CIO.com helped you stay a step ahead of your colleagues in 2011.
New Zealand mobile networks are distancing themselves from the recently discovered monitoring software installed surreptitiously on millions of phones overseas.
A controversy over smartphone privacy has reignited following a coder's recent post detailing how a hidden software application on Android-based HTC phones can collect a range of information about the user's activities.
An Asian boy approaches a man clad in black leather at an outdoor café in Chinatown. He whispers something in the man's ear. The man grabs his warrior of the future motorcycle helmet and speeds down the streets of San Francisco in pursuit of an armored car caravan. Explosions. Fireballs. Shuriken fly. Back at his lair, the marauder exposes the convoy's precious cargo: the <a href="http://www.pcworld.com/article/243328/motorola_droid_razr_review_thin_and_fast_but_short_on_battery_life.html?tk=rel_news">Droid Razr.</a> A title appears on the screen: Too Powerful to Fall into the Wrong Hands.
Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report.
It's a late night, and you've fired up Facebook on your ACME.com company-owned iPad to post some bad news. "A reduction in workforce is going to happen this week," you type into your update status field and tap the post button.