More than malware: The battle for mobile security

Handheld and Mobile Device Security Best Practices

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • What are common kinds of mobile spyware?

    When it comes to mobile spyware, there are almost too many types. Luckily, in this expert Q&A, Ed Skoudis narrows down the field and reveals how to defend against browser exploits, file droppers and keystroke loggers. 

  • Wireless security: IT pros warily watching mobile phone threats

    Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them. 

  • Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday. 

  • Mobile carriers admit to malware attacks

    Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small. 

  • Who should install handheld device security: Vendors or customers?

    Shipping companies use mobile devices to track their packages, but who should be in charge of the security software: the vendor or the customer? In this Q&A, information security threats expert Ed Skoudis suggests who should be pro... 

  • Integration migration

    Today John Swainson, president and chief executive officer of CA, will be making his first keynote speech at an RSA conference. Since joining CA in 2004, John has focused the company on its core strengths of systems, network, security and storage man... 

  • Expanding antivirus to include the mobile enterprise

    If your organization has yet to add mobile devices to its antivirus management strategy, it may be overlooking a tempting attack vector. As Sandra Kay Miller explains, it's not only necessary that PDAs, smartphones and other mobile devices have const... 

  • Podcast: Mobile device threats are real, white-hat hacker says

    Learn how easy it is for a hacker to gain access to a mobile device, whether employees are aware of security for their devices and why Bluetooth headsets should be turned off. 

  • How to survive mobile phone attacks

    While much of the information security world has remained focused on threats against PCs and Wi-Fi-enabled laptops, Mikko Hypponen has focused increasingly on potential attacks targeting mobile phones. Hypponen, director of antivirus research for Hel... 

  • Study: Some firms balk at mobile security

    Companies are failing to safeguard sensitive data on employee mobile devices, according to a survey by the Business Performance Management Forum.