By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Wireless and mobile security News
October 27, 2016
An XNU kernel vulnerability in iOS and macOS was patched after being reported by Google's Project Zero. And hackers at Pwn2Own 2016 cracked the Nexus 6P and iPhone 6s.
June 03, 2016
Roundup: The new SandJacking attack technique allows attackers with physical access to iOS devices to install rogue apps. Plus, more on medical software security and Privacy Shield obstacles.
September 25, 2015
News roundup: More fingerprint records were stolen during the OPM breach than originally reported. Plus: the $1 million iOS bounty; DHS CISO calls for harsher phishing policies; Safe Harbor in hot water.
September 18, 2015
News roundup: Additional research shows a Cisco router implant affects more devices than originally reported. Plus: Let's Encrypt's first cert issued; Tor in the library; the mitigated (but not fixed) iOS AirDrop vulnerability.
Wireless and mobile security Get Started
Bring yourself up to speed with our introductory content
The IT pro's job is to ensure the best network security network performance both. Our guide provides solid steps to take right now to achieve both in this age of mobile and the internet of things. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors try to catch some answers to the controversy around the Pokémon GO app and its permissions flaw. Continue Reading
Windows Wi-Fi Sense allows Windows 10 users to get Internet access from public hotspots and private wireless local area networks (WLANs) that have been shared by friends. Although Wi-Fi Sense is enabled by default in all editions of Windows 10, the ... Continue Reading
Evaluate Wireless and mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A copy-on-write vulnerability known as 'Dirty COW' was found in the Linux kernel of Android devices. Expert Michael Cobb explains the risks of this attack. Continue Reading
Apple has started to offer bug bounties to researchers who find vulnerabilities in iOS. Expert Michael Cobb compares Apple's program to that of other companies. Continue Reading
Do the significant improvements made by Google to Android 5 security mean Android devices are ready for enterprise use? Learn how Android stacks up against other mobile OS. Continue Reading
Manage Wireless and mobile security
Learn to apply best practices and optimize your operations.
In this excerpt from chapter three of Mobile Data Loss, author Michael T. Raggo discusses mobile security countermeasures. Continue Reading
Securing Android devices in the enterprise can seem like an uphill task. Applying these Android security policies might reduce the struggle security professionals face. Continue Reading
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy. Continue Reading
Problem Solve Wireless and mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this excerpt from chapter 10 of Handbook of System Safety and Security, editor Edward Griffor discusses cloud and mobile cloud architecture and security. Continue Reading
A boot mode vulnerability allowed attackers to eavesdrop on calls made on certain Android devices. Expert Judith Myerson explains how the complex exploit works. Continue Reading
An Android backdoor was discovered in the Ragentek firmware used in almost three million low-cost devices. Expert Michael Cobb explains how to prevent attacks on affected devices. Continue Reading