More than malware: The battle for mobile security

Handheld and Mobile Device Security Best Practices

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Should iPhone email be sent without SSL encryption?

    SSL encrypts all of the communication between your iPhone and your mail server. Network security expert Mike Chapple explains how important that feature really is. 

  • Employee-owned handhelds: Security and network policy considerations

    Consumer use of iPhones, smartphones and other handhelds has exploded in recent years, and naturally more employees want to use them for business. With today's growing number of personally owned devices on the network, enterprises must adapt their po... 

  • How secure is a mobile phone platform with an open source framework?

    Google's open source approach to mobile platform development has the potential to open up what has been until now a closed industry. Application expert Michael Cobb gives his early thoughts on Google's Android mobile phone. 

  • Defining mobile device security concerns

    Ed Skoudis explains how to secure sensitive data on mobile devices, and unveils the most common mobile security threats, such as physical theft and remote exploitation. 

  • Is the mobile malware threat overblown?

    Despite the popularity of the iPhone and other handheld devices, security experts say threats against them are still low. But that's only because enterprise use is still limited. 

  • BlackBerry flaw highlights growing mobile device risks

    Mobile security issues have been making waves, and following a recently revealed BlackBerry vulnerability, it's time to take notice. 

  • Policies for reducing mobile risk

    As the use of employee-owned mobile computing devices increases, so do the risks they pose to corporate networks and data. In this tip, Lisa Phifer outlines the essential components of an information security policy that deals with mobile devices -- ... 

  • Mobile device security in six simple steps

    By now, most information security professionals understand why enforcing laptop security is crucial to securing enterprise data. However, laptops aren't the only mobile devices that enterprises need to lock down. In this tip, Mike Chapple explains wh... 

  • Secure remote access: Closing the Windows Mobile Smartphone loophole

    After years of waiting, smartphones are finally being used to access corporate networks. But security programs for Windows laptops won't run as-is on Windows Mobile devices, leading users to engage in risky behavior. In this tip, Core Competence's Li... 

  • iPhone security in the enterprise: Mitigating the risks

    Since its flashy launch in June 2007, the Apple iPhone has certainly garnered a great deal of buzz. Almost immediately, hackers searched for exploitable flaws in the product, and they weren't disappointed. In this tip, Ed Skoudis examines iPhone-spec...