New & Notable
Mobile security threats and prevention News
February 08, 2019
New bug fix releases for both iOS and macOS include the anticipated FaceTime patch for the serious eavesdropping flaw in group chats as well as fixes for two iOS zero-days.
January 29, 2019
A new major FaceTime bug can allow someone to hear the other party's audio before they answer the call and the issue was reported to Apple more than a week ago.
December 31, 2018
Vulnerable dating apps on BYODs pose risks to more than just individual users. Find out what security flaws are common in these apps and what they mean for enterprises.
December 06, 2018
Soon after the Pegasus spyware was linked to the death of a Mexican journalist, a new lawsuit alleged the NSO Group and its spyware were also linked to the death of a Saudi journalist.
Mobile security threats and prevention Get Started
Bring yourself up to speed with our introductory content
End-user computing professionals must embrace modern Windows and mobile malware protection technologies to defend against ransomware and other attacks. Continue Reading
Securing mobile devices in the enterprise to effectively deflect potential breaches now means enterprise mobile management must evolve into unified endpoint management. Continue Reading
Security gaps in mobile devices can be many and varied, but they must be addressed immediately. Unified endpoint management is the next-gen way to close the gaps. Continue Reading
Evaluate Mobile security threats and prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT. Continue Reading
Unlike most apps developed in app stores, users can download Fortnite from Epic Games' website. Expert Michael Cobb explains the security risks of third-party app stores. Continue Reading
The iBoot source code on Apple devices was leaked to the public on GitHub. Expert Michael Cobb explains how it happened and what the implications are for iOS security. Continue Reading
Manage Mobile security threats and prevention
Learn to apply best practices and optimize your operations.
SIM swapping is on the rise as the use of mobile devices increases. Discover what SIM swaps are, how they work and how they can be mitigated. Continue Reading
An Apple security expert introduced the concept of synthetic clicks, which can bypass privilege escalation defenses. Find out how this new attack technique works with Nick Lewis. Continue Reading
Researchers from Check Point announced a new attack at Black Hat 2018 that targets Android devices. Discover how this attack works and how devices should be protected with Nick Lewis. Continue Reading
Problem Solve Mobile security threats and prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
IT must factor mobile users into its security plan. Intrusive applications and stolen devices are major security issues, but IT can account for these threats with proper planning. Continue Reading
An iPhone phishing scam leads users to believe malicious incoming calls are from Apple Support. How can enterprises protect their employee against this threat? Continue Reading
Android Rowhammer is a hardware weakness in older devices that puts users at risk of remote exploits. Expert Michael Cobb explains why it's important to upgrade to newer devices. Continue Reading