Mobile malware News
March 10, 2016
These common mobile security threats are rapidly growing due to user negligence, and because IT doesn't always know the best ways to combat them.
January 15, 2016
October 06, 2015
Malicious actors have found new ways to attack non-jailbroken iOS devices, but experts say the YiSpecter iOS malware may not be as dangerous as it sounds.
September 23, 2015
The largest incident of iOS malware found in the Apple App Store has grown exponentially, as researchers find more than 4,000 apps infected. And the attackers may have been inspired by CIA techniques.
Mobile malware Get Started
Bring yourself up to speed with our introductory content
A proof-of-concept attack on Apple's Siri allowed researchers to steal data from iOS. Learn more about the iStegSiri attack and how to defend against such threats. Continue Reading
A sophisticated variant of the NotCompatible malware has emerged that is difficult to detect and defend against. Expert Nick Lewis offers tips for handling NotCompatible.C. Continue Reading
Expert Ed Tittel explains why all organizations, no matter their size, need to protect endpoints with antimalware products. Continue Reading
Evaluate Mobile malware Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
SandJacking, a new iOS attack technique, uses an XCode certificate flaw to load malicious apps onto devices. Expert Michael Cobb explains how the attack works. Continue Reading
Some endpoint security suites have reached a level where they create almost all the capabilities of an enterprise in microcosm. New emphasis has been placed on protections that don't depend on traditional static scanning, but how well are these various approaches (whitelisting, sandboxing and so on) working out? And could the cloud possibly be the best endpoint security solution in today's mobile age? This handbook looks at the current state of endpoint protection and offers tips on how to best ensure endpoint security in the future.
SearchSecurity contributors examine the question of how best to secure endpoints, and provide actionable advice. Karen Scarfone questions the all-too-common assumption that using the cloud undermines security, and also outlines specific ways in which cloud-based tools can be useful in improving endpoint security. In a separate chapter, Scarfone considers whether the best endpoint security is achieved by combining tools and methods -- that is, by using an endpoint security suite. Ed Tittel focuses on the threat to endpoint security from malware and how antimalware tools can beef up defenses, offering scenarios that show how antimalware products work to secure endpoints. Continue Reading
Dealing with mobile application malware is a fluid process. IT needs a policy for vetting apps and educating users about potential security risks. Continue Reading
Manage Mobile malware
Learn to apply best practices and optimize your operations.
From compliance to security to app development, mobility adds a new layer of challenge for admins to deal with. Find out how to handle five of the most common issues. Continue Reading
How can enterprises enable mobility while insulating corporate networks from mobile malware? Per-app VPN tunnels offer secure remote access when combined with other measures. Continue Reading
When it comes to mobile security threats, IT has more to deal with than just risky, malicious apps. Continue Reading
Problem Solve Mobile malware Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
New mobile malware can affect both jailbroken and non-jailbroken iOS devices. Expert Nick Lewis outlines the threat posed by YiSpecter and how to stop it. Continue Reading
Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security. Continue Reading
Motion and gestures are being used for mobile malware detection on smartphones. Learn how this method works and whether it is a worthy addition to an enterprise security strategy. Continue Reading