New & Notable
Smartphone and PDA Viruses and Threats-Setup and Tools News
August 01, 2014
News roundup: The 'Fake ID' flaw on Android devices allows malicious apps to impersonate trusted ones, putting confidential data at risk and reigniting BYOD security concerns.
July 23, 2014
While BlackBerry's CEO touts the mobile platform's security features, experts question whether the advantage over iOS and Android still exists.
April 16, 2014
Though millions of Android devices could contain the Heartbleed OpenSSL vulnerability, experts say the risk to Android users may not be that great.
March 18, 2014
Vendors may hype the Android malware threat, but data indicates the Android security ecosystem has kept Android malware at bay.
Smartphone and PDA Viruses and Threats-Setup and Tools Get Started
Bring yourself up to speed with our introductory content
Learn about the growing risk of madware in mobile applications, as well as what enterprises should do to prevent security issues. Continue Reading
This newly updated Security School lesson breaks down BYOD challenges and help you develop a strategy that cuts across the myriad threats and platforms inside your organization. Continue Reading
CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when ... Continue Reading
Evaluate Smartphone and PDA Viruses and Threats-Setup and Tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This Beyond the Page focuses on how mobile application management can help CISOs move beyond consumer-oriented endpoints and their security tradeoffs. Continue Reading
What is mobile malware? HP says detection rates among mobile AV vendors vary greatly as experts struggle to define malicious activity in apps. Continue Reading
A new study has found that most vulnerabilities in Android smartphones from Samsung, HTC, LG, Sony and Google were put there by manufacturers. Continue Reading
Manage Smartphone and PDA Viruses and Threats-Setup and Tools
Learn to apply best practices and optimize your operations.
Expert Nick Lewis explains how to avoid a detrimental VPN bypass flaw that allows malicious apps to infiltrate Android devices. Continue Reading
Michael Cobb explains why an enterprise in-house app store is an effective weapon against malicious mobile apps and dispels common misunderstandings against this means for securing employee devices and company data. Continue Reading
Learn why enterprises must revise their defenses to keep mobile users and data safe, and where to concentrate your IT security budget. Continue Reading
Problem Solve Smartphone and PDA Viruses and Threats-Setup and Tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A variant of malware on Android devices removes and reinstalls itself when a device powers on or off. Learn how to completely eradicate the threat. Continue Reading
This seven-question quiz will test you on the key points we've covered in the malicious mobile apps Security School by Mike Cobb. Continue Reading
This Security School covers all aspects of dealing with malicious mobile apps, from identifying the real threat to sealing the security perimeter. Continue Reading