New & Notable
Mobile security threats and prevention News
November 22, 2019
Google expanded its Android bug bounty program to include data exfiltration and lock screen bypass and raised its top prize for a full chain exploit of a Pixel device.
November 15, 2019
Researchers discovered vulnerabilities in Qualcomm TrustZone that Check Point says could lead to 'unprecedented access' because of the extremely sensitive data stored in mobile secure elements.
September 05, 2019
Researchers say many -- if not most -- Android smartphones are at risk of SMS-based phishing attacks that trick users into installing malicious OTA provisioning settings.
August 20, 2019
Security researchers discovered a way to force Bluetooth devices to use easy-to-crack encryption keys, which could lead to man-in-the-middle attacks and information leaks.
Mobile security threats and prevention Get Started
Bring yourself up to speed with our introductory content
Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge. Continue Reading
In this post-perimeter era, endpoint detection and response tools can provide essential protection to thwart advanced persistent threats. Learn what EDR offers. Continue Reading
Malware, APTs and other threats are getting smarter, but so are endpoint detection and response products. Learn what the latest versions can do to keep threats away. Continue Reading
Evaluate Mobile security threats and prevention Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT. Continue Reading
Unlike most apps developed in app stores, users can download Fortnite from Epic Games' website. Expert Michael Cobb explains the security risks of third-party app stores. Continue Reading
The iBoot source code on Apple devices was leaked to the public on GitHub. Expert Michael Cobb explains how it happened and what the implications are for iOS security. Continue Reading
Manage Mobile security threats and prevention
Learn to apply best practices and optimize your operations.
City ransomware attacks are disruptive, annoying and potentially life-threatening. In increasingly mobile and perimeterless networks, how can municipalities prevent the risk? Continue Reading
Though many organizations have either UEM or EMM, mobile threat defense tools aren't as widely adopted. IT can improve mobile security with these tools' monitoring and policies. Continue Reading
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire. Continue Reading
Problem Solve Mobile security threats and prevention Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Learn about the planning of 3GPP in developing specifications for 5G security in this synopsis of 5G Americas' white paper, 'The Evolution of Security in 5G.' Continue Reading
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading
GPS and location-based services may be some of the most significant recent technological advancements, but they can also put personal privacy in jeopardy. Continue Reading