More than malware: The battle for mobile security

Handheld and Mobile Device Security Best Practices

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Study: Some firms balk at mobile security

    Companies are failing to safeguard sensitive data on employee mobile devices, according to a survey by the Business Performance Management Forum. 

  • Wireless device flaw discovered

    A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs. 

  • Infected iPods a threat to corporate networks

    Infected iPods plugged into work machines can pass malware to the larger network, IT administrators say. But the right security tools and policies can blunt the threat. 

  • Flaw found in Toshiba wireless device driver

    Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. 

  • Utimaco strives for ultimate mobile encryption

    With new U.S. government initiatives to protect data, data encryption on mobile devices is becoming a must-have for many firms. As The 451 Group's Nick Selby writes, German vendor Utimaco Safeware is rapidly expanding its presence in the U.S. using a... 

  • IT pros worried about unsecured devices

    IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies. 

  • Black Hat notebook: Flying under the radar

    Early details on a security vendor in stealth mode, security pros show keen interest in Windows Vista and a new problem looms for BlackBerrys. 

  • Intel's Centrino gear vulnerable to attack

    Chip giant Intel says a trio of flaws may lead to remote code execution, privilege escalation and disclosure of security information. AV firms say the flaws could spawn a new wireless worm. 

  • Credant helps IT shops secure mobile technology

    Product review: Though some features need work, Mobile Guardian Enterprise Edition 5.1 achieves its main mission of protecting confidential data on portable devices. 

  • Data breaches may be new boon for mobile security

    According to The 451 Group's Nick Selby, not only will recent data breaches encourage more companies to implement mobile device security technologies, but a number of mobile security vendors are poised to reap big benefits.