More articles by Lyne Bourque

Smartphones: Pocketable Endpoints or Network Backdoor?

Both actually. When evaluating endpoint security, don't neglect the "backdoor" some malware pushers are targeting.