By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Mobile security threats and prevention News
September 08, 2017
News roundup: Researchers used the new BootStomp tool to uncover six vulnerabilities in Android bootloaders. Plus, a new wave of AWS S3 bucket data leaks strikes and more.
August 22, 2017
Enterprise mobility management is crucial security technology, but it can't do everything. Mobile threat defense software helps IT stay ahead of the curve.
July 28, 2017
At Black Hat 2017, Exodus Intelligence researcher Nitay Artenstein unveiled the Broadpwn exploit, which he called the world's first Wi-Fi worm and which puts billions of iOS and Android devices at risk.
May 11, 2017
Google implemented clickjacking attack mitigations in Android but left a potential avenue for malicious actors that won't be fixed until Android O is released.
Mobile security threats and prevention Get Started
Bring yourself up to speed with our introductory content
Mobile app reputation is an assessment of the security and privacy of an app, typically expressed as a numerical rating. Continue Reading
Rolling code, also known as hopping code, is an encryption technique commonly used to provide a fresh code for each use of a passive keyless entry (PKE) system. Continue Reading
Mobile number privacy is the protection of the phone user’s number from unwanted access. Continue Reading
Evaluate Mobile security threats and prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Mobile application assessments can help enterprises decide which apps to allow, improving security. Christopher Crowley of the SANS Institute discusses how to use app assessments. Continue Reading
A copy-on-write vulnerability known as 'Dirty COW' was found in the Linux kernel of Android devices. Expert Michael Cobb explains the risks of this attack. Continue Reading
A full account access OAuth token was mistakenly issued to the Pokémon GO mobile game by Google. Expert Michael Cobb explains the security risks and if this can happen with other apps. Continue Reading
Manage Mobile security threats and prevention
Learn to apply best practices and optimize your operations.
Attackers can use the SandJacking attack to access sandboxed data on iOS devices. Expert Nick Lewis explains how to protect your enterprise from this attack. Continue Reading
In this Risk & Repeat podcast, SearchSecurity talks with James Plouffe, lead solutions architect at MobileIron and a technical advisor for the television series 'Mr. Robot.' Continue Reading
The Android Trojan Triada has the ability to replace a device's system functions with its own. Expert Michael Cobb explains how to mitigate the effects of this serious threat. Continue Reading
Problem Solve Mobile security threats and prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Smartphone users could be at risk of memory corruption attacks because of a baseband vulnerability. Expert Michael Cobb explains the attack and how concerned users should be. Continue Reading
A HummingBad malware variant, HummingWhale, was discovered being spread through 20 apps on the Google Play Store. Expert Nick Lewis explains the malware's new features. Continue Reading
Flaws in the Apple Notify function and iTunes can enable attackers to inject malicious script into the application side. Expert Michael Cobb explains how these vulnerabilities work. Continue Reading