Email Alerts
-
Apple security update: Is it ready for the enterprise?
It’s hard to declare Apple security as superior to its competitors, but it’s also hard to fault it as inferior. Feature
-
Managing BYOD endpoint security
This Security School will break down those challenges and help you develop and over-arching security strategy that cuts across the myriad threats and platforms inside your organization. partOfGuideSeries
-
Enterprise mobile device defense fundamentals
This Security School lesson will examine the realities of the security threat posed by mobile devices such as smartphones and tablets, the methods savvy attackers are using today to take advantage of vulnerable mobile devices, and the technology and ... partOfGuideSeries
-
Enterprise mobile device security 2012
See exclusive enterprise mobile device security survey results and analysis from the editors of SearchSecurity.com. Survey
-
Wireless Lunchtime Learning Security School
guide
-
Best Mobile Data Security Products 2011
Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption and removable storage device protection. Guide
-
Mobile device policy
In this Security School lesson, expert Lisa Phifer covers the technologies, policy items and processes your enterprise needs to be considering as mobile workforces ramp up and security and compliance concerns emerge. partOfGuideSeries
-
Handheld and mobile device security: Mobile malware, breach prevention
This mini learning guide offers tips from the experts on how to bulk up your mobile device security policies and techniques in order to protect sensitive corporate data. Our experts define common mobile device security concerns, and identify must-hav... Learning Guide
-
Mini guide: How to remove and prevent Trojans, malware and spyware
Organizations need to learn how to implement proper protections and understand best practices for malware defense in order to keep their network environments secure. In this mini guide you will learn how to prevent, remove and stop types of malware i... Learning Guide
-
Defending mobile devices from viruses, spyware and malware
Learn how to protect against mobile devices viruses, spyware and malware in this Messaging Security School Lesson with guest instructor Sandra Kay Miller. Messaging Security School
- See more Essential Knowledge on Smartphone and PDA Viruses and Threats-Setup and Tools
-
Public Wi-Fi hotspots pose real threat to enterprises, survey finds
Public Wi-Fi usage has gone up significantly in the past year, and many people are using insecure hotspots to access work information. News | 18 Oct 2012
-
Google no longer playing with Android malware
Some say the Android malware problem is out of hand, and it appears Google is taking additional steps to block attacks in its Google Play store. News | 18 Oct 2012
-
Firms failing at mobile application development security, study finds
Security is failing to gain a priority in the rush to build and test mobile applications, according to a study by Capgemini. News | 19 Sep 2012
-
Android malware uses Anime character Anaru to entice users
Cybercriminals use Anime character Anaru to lure users into downloading an app that collects personal information, Symantec says. News | 10 Sep 2012
-
Security firm warns of Android mobile toll fraud in latest mobile malware report
As many as six million people have encountered malware during the last 12 months, according to mobile security firm Lookout. News | 06 Sep 2012
-
McAfee sees continued rise in Android malware
Nearly all new mobile malware was directed at the Android platform in the second quarter of 2012, according to the latest McAfee threat report. News | 05 Sep 2012
-
BYOD gaining ground as employees increasingly need mobile access
More than half of businesses are using BYOD, and nearly three-quarters believe the benefits of mobility outweigh the risks, according to a new survey. News | 15 Aug 2012
-
Smartphone, BYOD security risks fuel interest in MDM platforms, survey finds
Device loss tops a growing list of concerns, but the potential for malware and data leakage fuels interest in platforms to control personal devices. News | 08 Aug 2012
-
Third-party Android markets host bulk of mobile malware, says F-Secure
The most serious Android mobile malware uses SMS premium messages to make cybercriminals money, a tried and true attack method. News | 07 Aug 2012
-
Black Hat 2012: Poor mobile app security drains enterprise data
Mobile apps collect a myriad of data sources from contacts to location information and could also be accessing sensitive enterprise data. News | 26 Jul 2012
- See more News on Smartphone and PDA Viruses and Threats-Setup and Tools
-
Loss of BlackBerry, security benefits would hurt enterprise mobile security
Opinion: BlackBerry security has been a boon to enterprises, and unless security pros help save the platform, enterprise mobile security will suffer. Opinion
-
How to set up your own secure enterprise Android app store
Reduce the risk posed by smartphones and mobile applications by setting up a corporate app store for users that helps ensure Android application security. Tip
-
Carrier IQ software: A big risk to enterprise mobile security?
Nick Lewis exposes the fact and fiction of the Carrier IQ software and the potential information security risk for enterprises. Tip
-
Enterprise mobile access: Considerations for two-factor mobile authentication
Is two-factor mobile authentication the only answer to secure enterprise mobile access? Randall Gamby explores keeping mobile access under control. Tip
-
Mitigating security risks of mobile location-based services technology
What can enterprises do to mitigate the security risk of mobile location-based services technology and the like? Start by limiting smartphone apps. Tip
-
Network access control policy: Handling smartphone access control
NAC can be helpful for laptops and desktops, but it’s limited with mobile devices. In this tip, learn how to extend NAC for smartphone access control. Tip
-
Android enterprise security: Mobile phone data protection advice
Android devices are increasingly popular among enterprise users, but is Android enterprise security where it needs to be to ensure the safety of important enterprise documents? Expert Michael Cobb offers his take. Tip
-
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network eavesdrop... Tip
-
Protecting enterprise networks from new mobile application downloads
Thanks to the proliferation of mobile application download sites, enterprise users now have a nearly unlimited number of third-party apps installed on their handhelds. Sandra Kay Miller explains how administrators can keep their networks safe while s... Tip
-
Smartphone security: The growing threat of mobile malware
The increasingly pervasive use of wireless handhelds in the enterprise is just one reason why malware pros are getting serious about mobile malware. Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, an... Tip
-
iPhone security in the enterprise: Mitigating the risks
Since its flashy launch in June 2007, the Apple iPhone has certainly garnered a great deal of buzz. Almost immediately, hackers searched for exploitable flaws in the product, and they weren't disappointed. In this tip, Ed Skoudis examines iPhone-spec... Tip
- See more Tips on Smartphone and PDA Viruses and Threats-Setup and Tools
-
BB10 security: The risks of running Android apps on BlackBerry 10
Expert Michael Cobb explains the implications of running Android apps on BB10 and the system's new security features, including Balance. Answer
-
Should Android kernel vulnerabilities make enterprises avoid Samsung?
Expert Nick Lewis discusses the threat and significance of Android kernel vulnerabilities found in popular Samsung mobile devices. Answer
-
How Android users can overcome LeNa malware, slow carrier updates
Android users can't rely on slowly deployed carrier updates to protect them from the LeNa malware. Expert Nick Lewis explains. Answer
-
Mobile device protection: How to thwart SMS Trojans
Expert Nick Lewis explains how to properly secure a smartphone in order to thwart Trojans that steal SMS messages. Answer
-
Can Android virtual patching thwart Android malware attacks?
Application security expert Mike Cobb weighs the pros and cons of Android virtual patching to thwart Android malware attacks. Answer
-
Assessing smartphone eavesdropping via keyboard vibrations
Is smartphone eavesdropping via keyboard vibrations a credible enterprise threat? Mike Chapple explains. Answer
-
Encrypting text messages to protect against mobile Trojans
SMS-stealing Trojans can be thwarted by encrypting text messages on smartphones. Answer
-
Android malicious apps: How to tell secure Android apps from malware
Distinguishing malicious Android apps from clean ones can be tough, particularly for users with little security savvy. Expert Nick Lewis gives advice. Answer
-
Do any particular mobile device vulnerabilities outweigh the others?
Are there certain mobile devices that are inherently more vulnerable than others? Learn more in this expert response from Nick Lewis. Answer
-
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Ask the Expert
- See more Expert Advice on Smartphone and PDA Viruses and Threats-Setup and Tools
-
Tactical Success for Multiplatform Endpoint Security
In this presentation, Craig Mathias discusses the hottest trend in enterprise IT today: BYOD. This discussion focuses on bring your own device (BYOD) security challenges, security techniques and management strategies. Mathias offers key recommendatio... Video
-
Peter Kuper on hacktivism, the evolution of hacking and mobile threats
In-Q-Tel's Peter Kuper discusses hacktivists’ desire for attention, and how the growing use of mobile devices is driving the evolution of hacking. Video
-
Mobile platform security hindered by carriers, handset makers
Video: Mobile platform security expert Aaron Turner explains why handset OEMs and mobile carriers aren't often expediting smartphone security updates. Video
-
Expert: Mobile app privacy issues may lead to enterprise data leakage
Video: Mobile app privacy issues threaten contacts, calendar items and other sensitive data, said Domingo Guerra of San Francisco-based Appthority. Video
-
Joel Snyder’s five-step mobile device protection plan
Are securing mobile devices a top priority for your enterprise? Expert Joel Snyder discusses his five-step mobile device protection plan in this exclusive SearchSecurity.com video. Video
-
Black Hat 2011: Drive-by attacks can cause Android privacy leaks
Neil Daswani and his team demonstrated a drive-by attack on an Android smartphone and discussed behavioral analysis of more than 10,000 Android applications. Video
-
Don Bailey on mobile device threats, mobile device security policy
In this video, researcher Don Bailey of iSec Partners discusses the myriad threats facing corporate mobile devices, and how to stop them. Video
-
Fact or fiction: Mobile device attacks
Access this podcast to find out how to avoid mobile threats, and discover which of the top five myths about mobile security are true and which are false. Podcast
-
Mobile malware targeting Android, iPhones, says Kaspersky Lab expert
Mobile malware has been increasing in scope and intensity explains Denis Maslennikov, senior malware analyst on Kaspersky Lab's global research and analysis team. Video
-
RSA Conference 2011 preview: Mobile security
In this RSA Conference 2011 preview video, SearchSecurity.com News Director Robert Westervelt moderates a discussion on the growing threat posed by mobile devices and the state of the network perimeter. Speakers include SearchSecurity.com Senior Site... Video
- See more Multimedia on Smartphone and PDA Viruses and Threats-Setup and Tools
-
BB10 security: The risks of running Android apps on BlackBerry 10
Expert Michael Cobb explains the implications of running Android apps on BB10 and the system's new security features, including Balance. Answer
-
Should Android kernel vulnerabilities make enterprises avoid Samsung?
Expert Nick Lewis discusses the threat and significance of Android kernel vulnerabilities found in popular Samsung mobile devices. Answer
-
Apple security update: Is it ready for the enterprise?
It’s hard to declare Apple security as superior to its competitors, but it’s also hard to fault it as inferior. Feature
-
Managing BYOD endpoint security
This Security School will break down those challenges and help you develop and over-arching security strategy that cuts across the myriad threats and platforms inside your organization. partOfGuideSeries
-
Tactical Success for Multiplatform Endpoint Security
In this presentation, Craig Mathias discusses the hottest trend in enterprise IT today: BYOD. This discussion focuses on bring your own device (BYOD) security challenges, security techniques and management strategies. Mathias offers key recommendatio... Video
-
Peter Kuper on hacktivism, the evolution of hacking and mobile threats
In-Q-Tel's Peter Kuper discusses hacktivists’ desire for attention, and how the growing use of mobile devices is driving the evolution of hacking. Video
-
Mobile platform security hindered by carriers, handset makers
Video: Mobile platform security expert Aaron Turner explains why handset OEMs and mobile carriers aren't often expediting smartphone security updates. Video
-
How Android users can overcome LeNa malware, slow carrier updates
Android users can't rely on slowly deployed carrier updates to protect them from the LeNa malware. Expert Nick Lewis explains. Answer
-
Public Wi-Fi hotspots pose real threat to enterprises, survey finds
Public Wi-Fi usage has gone up significantly in the past year, and many people are using insecure hotspots to access work information. News
-
Google no longer playing with Android malware
Some say the Android malware problem is out of hand, and it appears Google is taking additional steps to block attacks in its Google Play store. News
- See more All on Smartphone and PDA Viruses and Threats-Setup and Tools
About Smartphone and PDA Viruses and Threats-Setup and Tools
Get the latest news on smartphone and PDA viruses and threats. Learn how viruses, Trojans, malicious code and worms can infect smartphones, PDAs and mobile devices, such as iPhones and Blackberrys and how to prevent these attacks.
Security Management Strategies for the CIO