Mobile

Best IAM Software

    The identity and access management (IAM) market is going through significant changes, as behavior analytics and zero trust become an increasingly important part of...

Google Patches Android for 47 Vulnerabilities in Final Update for 2017

Google released what is likely its final Android security update for 2017...

Eavesdropper Flaw, Marcher Malware Threaten Mobile Devices

Researchers at Appthority and Proofpoint recently came across two threats to mobile devices that present a particular threat to enterprise users and...

Google Patches KRACK Wi-Fi Flaw in Android November Security Update

Some vendors take longer than others to update for critical vulnerabilities - case in point is Google's Android mobile operating system. On...

Averon Banks $8.3 Million, Promises ‘Frictionless’ Mobile Authentication

San Francisco-based Averon, a mobile authentication startup, announced today that it had secured $8.3...

KRACK WPA2 Attack Threatens Every Device That Uses Wi-Fi

Mathy Vanhoef, a postdoctoral researcher at Belgium's University of Leuven, recently uncovered what...

Google Android and Apple iOS Update for Critical Wi-Fi Vulnerabilities

Once again, both Google and Apple have cooperated as part of a mobile operating system vendor industry coordination effort to patch a...

Best Enterprise Mobility Management (EMM) Solutions

Managing mobile apps and devices is a challenge faced by all organizations these days. One technology that's evolved to address mobile security, access and...

App Install Advertising Fraud is a $300M Problem

Among the various forms of online advertising today are ads that aim...

Google Improves Security in Android 8.0 Oreo

Google officially announced the latest iteration of its mobile operating system on August 21 with the debut of Android 8.0 Oreo. While...

Latest articles

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...

Common IT Security Vulnerabilities – and How to Defend Against Them

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those...

New TCP/IP Vulnerabilities Expose IoT, OT Systems

Forescout Research Labs last month released a 14-page white paper and a 47-page research report detailing 33 vulnerabilities affecting millions of Internet of Things...