With enhanced features for users' personal and professional lives alike, Android 9 Pie raises the bar yet again for Google's mobile OS offering.
In July 2018, Researches reported three fake Android banking apps that phished for users' credit card details and leaked them online by transferring them to an exposed server.
An unknown threat actor leaked the source code for the Android malware Exobot, leading to fears of an impending attack similar to the massive DDoS incident that hit domain name provider Dyn in 2016.
IBM developed a new AI-enabled voice assistant to respond to common questions across email, corporate contacts and calendar using natural language processing (NLP) capabilities.
IBM was named a leader in the 2018 Magic Quadrant for Unified Endpoint Management Tools report for its completeness of vision and ability to execute.
In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently.
As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
Unified endpoint management (UEM) delivers on the promise of bringing a vast range of endpoints and enterprise use cases under one management console.
Step into the shoes of an insurance company CEO chasing digital transformation. Read on as she tries to avoid missteps in this story about modernization, risks, fraud and user experience.
Recent advancements have paved the way for the creation of a new, hybrid technology: mixed reality (MR). Developers are exploring how MR can add value to a variety of industries.