Electronics manufacturing

Mobile malware News

View All News

Mobile malware Get Started

Bring yourself up to speed with our introductory content

Evaluate Mobile malware Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • How does SandJacking let attackers load malware on iOS devices?

    SandJacking, a new iOS attack technique, uses an XCode certificate flaw to load malicious apps onto devices. Expert Michael Cobb explains how the attack works. Continue Reading

  • The best endpoint security approach in this interconnected age

    Some endpoint security suites have reached a level where they create almost all the capabilities of an enterprise in microcosm. New emphasis has been placed on protections that don't depend on traditional static scanning, but how well are these various approaches (whitelisting, sandboxing and so on) working out? And could the cloud possibly be the best endpoint security solution in today's mobile age? This handbook looks at the current state of endpoint protection and offers tips on how to best ensure endpoint security in the future.

    SearchSecurity contributors examine the question of how best to secure endpoints, and provide actionable advice. Karen Scarfone questions the all-too-common assumption that using the cloud undermines security, and also outlines specific ways in which cloud-based tools can be useful in improving endpoint security. In a separate chapter, Scarfone considers whether the best endpoint security is achieved by combining tools and methods -- that is, by using an endpoint security suite. Ed Tittel focuses on the threat to endpoint security from malware and how antimalware tools can beef up defenses, offering scenarios that show how antimalware products work to secure endpoints. Continue Reading

  • Steer clear of mobile application security risks

    Dealing with mobile application malware is a fluid process. IT needs a policy for vetting apps and educating users about potential security risks. Continue Reading

View All Evaluate

Manage Mobile malware

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Mobile malware Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • The security divide between on-premises and cloud infrastructures

    Fenwick & West LLP's IT services are delivered through a hybrid of on-premises, software-as-a-service and cloud infrastructures. "As we straddle the cloud and on premises, our security problems have just broadened," said CIO Matt Kesner.

    The Silicon Valley law firm's experience is typical of the growing number of companies that are running into legacy security obstacles as they move workloads to the cloud. Security technologies designed to protect enterprise applications and data on premises are often ill-suited for cloud infrastructures. We talked to security executives and analysts about what to consider when you're tasked with integrating legacy security systems with cloud services.

    Corporate boards must be ready to defend their fiduciary decisions, compliance actions and, perhaps soon, even cybersecurity preparedness. A growing number of companies are seeking cyber-savvy board members, but it's still far from a majority. Should companies add board members with cybersecurity or cyber-risk experience? We look at both sides of the debate.

    Western Union rolled out a strategy to help its workforce take advantage of cloud services. The program -- dubbed Western Union Information Security Enablement, or WISE -- involved bringing shadow IT into the light, approving cloud services for official use and adding the necessary controls and policies to secure cloud infrastructures. We catch up with the company's senior manager of information security to find out how it's going.

     Continue Reading

  • How does YiSpecter affect non-jailbroken iOS devices?

    New mobile malware can affect both jailbroken and non-jailbroken iOS devices. Expert Nick Lewis outlines the threat posed by YiSpecter and how to stop it. Continue Reading

  • Top five Android device management security challenges

    Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close