New & Notable
Smartphone and PDA Viruses and Threats-Setup and Tools News
August 21, 2014
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
August 01, 2014
News roundup: The 'Fake ID' flaw on Android devices allows malicious apps to impersonate trusted ones, putting confidential data at risk and reigniting BYOD security concerns.
July 23, 2014
While BlackBerry's CEO touts the mobile platform's security features, experts question whether the advantage over iOS and Android still exists.
April 16, 2014
Though millions of Android devices could contain the Heartbleed OpenSSL vulnerability, experts say the risk to Android users may not be that great.
Smartphone and PDA Viruses and Threats-Setup and Tools Get Started
Bring yourself up to speed with our introductory content
Learn about the growing risk of madware in mobile applications, as well as what enterprises should do to prevent security issues. Continue Reading
This newly updated Security School lesson breaks down BYOD challenges and help you develop a strategy that cuts across the myriad threats and platforms inside your organization. Continue Reading
CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when ... Continue Reading
Evaluate Smartphone and PDA Viruses and Threats-Setup and Tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Employees want to use their own mobile devices at work. Enterprises need to ensure the safety of their corporate data. Can VDI solve BYOD security issues? Expert Michael Cobb discusses why VDI may not hold all the answers. Continue Reading
This Beyond the Page focuses on how mobile application management can help CISOs move beyond consumer-oriented endpoints and their security tradeoffs. Continue Reading
What is mobile malware? HP says detection rates among mobile AV vendors vary greatly as experts struggle to define malicious activity in apps. Continue Reading
Manage Smartphone and PDA Viruses and Threats-Setup and Tools
Learn to apply best practices and optimize your operations.
Expert Nick Lewis explains how to avoid a detrimental VPN bypass flaw that allows malicious apps to infiltrate Android devices. Continue Reading
Michael Cobb explains why an enterprise in-house app store is an effective weapon against malicious mobile apps and dispels common misunderstandings against this means for securing employee devices and company data. Continue Reading
This presentation explains the threat from malicious mobile apps and how to neutralize it through rules, training and more. Continue Reading
Problem Solve Smartphone and PDA Viruses and Threats-Setup and Tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A variant of malware on Android devices removes and reinstalls itself when a device powers on or off. Learn how to completely eradicate the threat. Continue Reading
This seven-question quiz will test you on the key points we've covered in the malicious mobile apps Security School by Mike Cobb. Continue Reading
This Security School covers all aspects of dealing with malicious mobile apps, from identifying the real threat to sealing the security perimeter. Continue Reading