More than malware: The battle for mobile security

Handheld and Mobile Device Security Best Practices

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Apple iPhone crack discovered by security researchers

    Researchers have found a way to take complete control of the Apple iPhone by sending a user to a malicious Web site. 

  • Interop: Vendors update software, demonstrate new security features

    3Com targets SMBs; Shift4 introduces gateway to wipe data; SecureWave updates software; StillSecure opens support program; and BlueCoat demonstrates mobile security tools. 

  • TJX breach tied to Wi-Fi exploits

    The TJX hackers started their assault two years ago by attacking security holes in the retail giant's wireless system outside a Minnesota Marshalls. 

  • DOS flaw affects BlackBerry devices

    Attackers could exploit a flaw in BlackBerry Device Software versions 4.2 and earlier to cause a denial of service, but a service pack upgrade will correct the problem. 

  • Wireless security: IT pros warily watching mobile phone threats

    Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them. 

  • Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday. 

  • Mobile carriers admit to malware attacks

    Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small. 

  • Integration migration

    Today John Swainson, president and chief executive officer of CA, will be making his first keynote speech at an RSA conference. Since joining CA in 2004, John has focused the company on its core strengths of systems, network, security and storage man... 

  • Podcast: Mobile device threats are real, white-hat hacker says

    Learn how easy it is for a hacker to gain access to a mobile device, whether employees are aware of security for their devices and why Bluetooth headsets should be turned off. 

  • How to survive mobile phone attacks

    While much of the information security world has remained focused on threats against PCs and Wi-Fi-enabled laptops, Mikko Hypponen has focused increasingly on potential attacks targeting mobile phones. Hypponen, director of antivirus research for Hel...