Mobile

App Install Advertising Fraud is a $300M Problem

Among the various forms of online advertising today are ads that aim to get people to install mobile apps. According to security firm DataVisor, the app install advertising...

Google Improves Security in Android 8.0 Oreo

Google officially announced the latest iteration of its mobile operating system on August 21 with the debut of Android 8.0 Oreo. While performance is one of the headline features in the new release,...

Google Patches Android for 49 Vulnerabilities in August Update

Google released its August Android Security update on August 7, patching no less than 49 different vulnerabilities in the mobile operating system.Android's much-maligned media framework is home to 2...

Google Patches Android and Chrome for Security Vulnerabilities

Google's security teams are keeping busy this week, updating the Android mobile operating system and Chrome browser for Windows, macOS and Linux.AndroidOnce again, Google is patching multiple vulner...

Types of Mobile Malware & Solutions

As users have increasingly moved from desktop operating systems to mobile devices as their primary form of computing, cyber attackers have taken notice and malware has follo...

Google Patches 17 Critical Vulnerabilities in Android May Security Update

Google is pushing out its May patch update for Android devices this week, with the much maligned mediaserver component once again being patched for critical vulnerabilities.The...

64 Percent of Security Pros Can’t Stop a Mobile Data Breach

Sixty-four percent of security professionals doubt their organizations can prevent a breach to employees' mobile devices, a recent Dimensional Research survey of 410 security leaders found.The surv...

What is Mobile Device Management (MDM)?

The era of employees bringing their own devices into corporate environments created the need for advanced technology platforms to help control all types of devices. Bring Your Own Device, often shorte...

Ultimate Guide to BYOD Security

A core element of computing access is end users and their devices. It is the device that will access a network or corporate application and it is often the device that represents the "last mile" of se...

Enterprise Mobility Management Guide

The modern enterprise is mobile and employees are no longer tethered to their corporate owned and provisioned computing equipment. As is the case in the wired world, mobile ...

Latest articles