Sussex Health Informatics Service monitoring 40,000 devices read more »
The app, set for release next week, sits on top of the Android operating system and becomes the phone's user interface read more »
Flaws could allow attackers to execute commands with high privileges and read sensitive passwords stored on the product read more »
Last month's malware attacks and nuclear sabre rattling drive cooperation read more »
Effective program needed to secure mobile devices at West Point and Corps of Engineers, report says read more »
Its not the source of an attack that matters, its how well you are prepared for them read more »more news ..
Sophos Blogsmore blogs ..
On demand Biztech Briefing-Learn how to effectively deliver mobile work styles and cloud services together.
Check out our latest articles on Microsoft's next-generation operating system.
View the latest capacity management resources including whitepapers, videos and news.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Sophos In Depth
What if an app uploads a sales representatives' contact list and the developer then sells it to a competitor? read more »
Security researchers proposed several methods to protect computers from being compromised via a new Java vulnerability read more »
Social networking company has little new to say about how 6.5 million passwords ended up on Russian hacking site read more »
Hackers make mistakes just as often as anyone else read more »
Top feature requests for the next iPhone iteration read more »
Social media and identity fraud go hand in hand read more »more in depth ..
No, really, they're sorry! Vendors apologise in 2012 for everything from Apple Maps to Cisco Connect Cloud to outage after outage and breach after breach read more »more slideshows ..