Mobile application security threats and mitigations

Smartphone and PDA Viruses and Threats-Setup and Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Learning guide: The five steps of baseline Bluetooth security

    In this five step Learning Guide, you will learn the Bluetooth security basics, including how to protect against a Bluetooth hack or virus, how to disable Bluetooth and how to secure Bluetooth devices in the enterprise. 

  • When a handheld becomes a security problem

    Read Chapter 4, When a Handheld Becomes Information Security's Problem, from the book "PDA Security" written by David Melnick, Mark Dinman, Alexander Muratov and Robert Elfanbaum.