Mobile application security threats and mitigations

Smartphone and PDA Viruses and Threats-Setup and Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • DOS flaw affects BlackBerry devices

    Attackers could exploit a flaw in BlackBerry Device Software versions 4.2 and earlier to cause a denial of service, but a service pack upgrade will correct the problem. 

  • Wireless security: IT pros warily watching mobile phone threats

    Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them. 

  • Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday. 

  • Mobile carriers admit to malware attacks

    Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small. 

  • Podcast: Mobile device threats are real, white-hat hacker says

    Learn how easy it is for a hacker to gain access to a mobile device, whether employees are aware of security for their devices and why Bluetooth headsets should be turned off. 

  • How to survive mobile phone attacks

    While much of the information security world has remained focused on threats against PCs and Wi-Fi-enabled laptops, Mikko Hypponen has focused increasingly on potential attacks targeting mobile phones. Hypponen, director of antivirus research for Hel... 

  • Infected iPods a threat to corporate networks

    Infected iPods plugged into work machines can pass malware to the larger network, IT administrators say. But the right security tools and policies can blunt the threat. 

  • Flaw found in Toshiba wireless device driver

    Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. 

  • IT pros worried about unsecured devices

    IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies. 

  • Intel's Centrino gear vulnerable to attack

    Chip giant Intel says a trio of flaws may lead to remote code execution, privilege escalation and disclosure of security information. AV firms say the flaws could spawn a new wireless worm.