Mobile Security - Article Archives - Page 1

New Bluetooth Attack Affects Billions of Devices Worldwide

September 12, 2017 |

The exploit, which requires no user interaction, can give the attacker control of the affected device.

READ MORE

App Install Advertising Fraud is a $300M Problem

August 25, 2017 |

New report from DataVisor on the underworld of app install advertising reveals the techniques used by fraudsters.

READ MORE

Google Improves Security in Android 8.0 Oreo

August 22, 2017 |

New version of Android includes multiple new capabilities to enhance mobile operating system security.

READ MORE

Google Patches Android for 49 Vulnerabilities in August Update

August 08, 2017 |

Once again, Google's media framework is home to the bulk of the patched issues.

READ MORE

VPN Security: How VPNs Work and How to Buy the Best One

July 11, 2017 |

Virtual private networks (VPNs) come with many different protocols and features, so choosing the best one for your organization requires some research. We outline your options.

READ MORE

Comodo AEP Eschews Tradition to Bring a New Level of Protection to the Enterprise

June 08, 2017 |

Comodo’s Advanced Endpoint Protection (AEP) brings AI-powered analysis and a default-deny containment approach to the enterprise.

READ MORE

Google Patches Android and Chrome for Security Vulnerabilities

June 06, 2017 |

Android June update and Chrome 59 provide fixes for security flaws.

READ MORE

Sensory's TrulySecure Biometric Security Gets an AI Upgrade

May 18, 2017 |

The company's latest update to its TrulySecure biometrics technology includes advanced deep learning algorithms that are tougher to trick.

READ MORE

Mobile Malware: What It Is and How to Stop It

May 09, 2017 |

Mobile malware is growing. Do you know what mobile malware is and more importantly, how to keep it off your device?

READ MORE

Hackers Leverage Flaws in SS7 to Drain Victims' Bank Accounts

May 08, 2017 |

The attackers were able to redirect SMS messages used for two-factor authentication in order to approve money transfers.

READ MORE

Google Patches 17 Critical Vulnerabilities in Android May Security Update

May 05, 2017 |

Google is out with its fifth patch update of 2017, with mediaserver flaws once again topping the list.

READ MORE

64 Percent of Security Pros Can't Stop a Mobile Data Breach

April 21, 2017 |

And 51 percent believe the risk of mobile data loss is equal to or greater than that for PCs, a recent survey found.

READ MORE

Identity and Access Management: Balancing Access and Security

April 07, 2017 |

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

Enterprise Mobility Management (EMM): Securing Corporate Data on Mobile Devices

April 05, 2017 |

When it comes to Bring Your Own Device (BYOD), Mobile Device Management (MDM) isn't enough anymore. That's what Enterprise Mobility Management (EMM) is all about.

READ MORE

Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

April 05, 2017 |

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE

BYOD Security: Understanding Bring Your Own Device Security Risks

April 05, 2017 |

The Bring Your Own Device, or BYOD, era has redefined the modern corporate landscape. Learn about the risks - and the tools you can use to securely embrace BYOD.

READ MORE

Different Types of Malware and How to Defend Against Them

April 04, 2017 |

Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.

READ MORE

Major Security Flaws Uncovered in Samsung's Tizen Operating System

April 04, 2017 |

The OS is in use on a wide range of devices, including Galaxy Gear smartwatches and Z1, Z2 and Z3 phones.

READ MORE

CASB 101: How Cloud Access Security Brokers Can Make Your Data More Secure

March 28, 2017 |

More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.

READ MORE

Network Access Control: Restricting and Monitoring Access to Your Network and Data

March 24, 2017 |

Network access control lets IT departments determine which users and devices have authorized permissions, adding another level of security to the network and its data.

READ MORE