Smartphone and PDA Viruses and Threats-Setup and Tools News
March 21, 2016
Researchers have developed a Stagefright exploit, which could mean hundreds of millions of Android devices are at risk, despite mitigations and an available patch.
November 10, 2015
Bluebox Security unveiled a troubling study on mobile application threats and also introduced a new product to protect consumer apps on employee-owned devices.
October 06, 2015
Malicious actors have found new ways to attack non-jailbroken iOS devices, but experts say the YiSpecter iOS malware may not be as dangerous as it sounds.
October 01, 2015
The Android Stagefright vulnerability has been updated to version 2.0, as the original researcher found the flaw in all versions of Android released to date. Google has promised a fix within days.
Smartphone and PDA Viruses and Threats-Setup and Tools Get Started
Bring yourself up to speed with our introductory content
The Android Trojan Triada has the ability to replace a device's system functions with its own. Expert Michael Cobb explains how to mitigate the effects of this serious threat. Continue Reading
A vulnerability in the AirDroid device manager app left users at risk of phone hijacking. Expert Michael Cobb explains how the exploit works, and what can be done to prevent it. Continue Reading
A vulnerability was found in the Blackphone's Icera modem. Expert Michael Cobb explains how attackers could hijack the device, and if this would occur in other mobile devices. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Smartphone and PDA Viruses and Threats-Setup and Tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A new Stagefright exploit called Metaphor has been released. Expert Nick Lewis explains its ability to do an ASLR bypass, and what it means for Android device security. Continue Reading
Do the significant improvements made by Google to Android 5 security mean Android devices are ready for enterprise use? Learn how Android stacks up against other mobile OS. Continue Reading
According to recent research, mobile certificate usage is riddled with security issues. Expert Michael Cobb explains how to best control and secure mobile certificates in the enterprise. Continue Reading
Manage Smartphone and PDA Viruses and Threats-Setup and Tools
Learn to apply best practices and optimize your operations.
Securing Android devices in the enterprise can seem like an uphill task. Applying these Android security policies might reduce the struggle security professionals face. Continue Reading
Flaws in the AFNetworking code library threaten iOS app security. Expert Michael Cobb explains how to prevent falling victim to the flaws. Continue Reading
In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Continue Reading
Problem Solve Smartphone and PDA Viruses and Threats-Setup and Tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A pirated app called Happy Daily English beat Apple's App Store security review. Expert Michael Cobb explains how it works and what security teams can do about it. Continue Reading
An Android Trojan called SlemBunk is impersonating banking applications in order to collect user credentials. Expert Nick Lewis explains the security measures to stop this malware. Continue Reading
New mobile malware can affect both jailbroken and non-jailbroken iOS devices. Expert Nick Lewis outlines the threat posed by YiSpecter and how to stop it. Continue Reading