Wireless and mobile security
In this guide, get advice on tools, software and tactics for wireless network security and wireless mobile device security. Learn how to build and maintain a secure wireless LAN, how to protect mobile devices, and how to successfully configure, implement and manage a solid wireless network.
New & Notable
Wireless and mobile security News
-
July 13, 2020
13
Jul'20
RSA finds two-thirds of phishing attacks directed at Canada
RSA Security researchers found that nearly 70% of phishing attacks were directed at users in Canada, while the majority of attacks come from U.S.-based ISPs and hosting providers.
-
June 16, 2020
16
Jun'20
ZDI drops 10 zero-day vulnerabilities in Netgear router
Trend Micro's Zero Day Initiative published 10 vulnerabilities in Netgear's R6700 router that have gone unpatched for seven months.
-
May 26, 2020
26
May'20
StrandHogg 2.0 allows attackers to imitate most Android apps
A new elevation-of-privilege vulnerability on Android, dubbed StrandHogg 2.0, allows threat actors to gain access to most apps, according to Norwegian mobile security firm Promon.
-
May 22, 2020
22
May'20
Risk & Repeat: When will mobile voting be ready?
This week's Risk & Repeat podcast examines the rise of mobile voting apps and how security experts have expressed concerns about the risks deploying the technology for elections.
Wireless and mobile security Get Started
Bring yourself up to speed with our introductory content
-
Differences among WEP, WPA, WPA2 and WPA3 wireless security protocols
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences among WEP, WPA, WPA2 and WPA3. Continue Reading
-
Inbound vs. outbound firewall rules: What are the differences?
Explore the differing roles of inbound versus outbound firewall rules for enterprise network security and the varying use cases for each. Continue Reading
-
What are the top secure data transmission methods?
Safe information transfer is a must for modern organizations, but not all secure data transmission methods are equal. Explore your secure data transfer options in this tip. Continue Reading
Evaluate Wireless and mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
10 cybersecurity best practices and tips for businesses
Looking to improve your business's security program? Our top-10 list of cybersecurity advice breaks out best practices and tips for security professionals and for employees. Continue Reading
-
US-China 5G competition hinges on enterprise apps, services
In the U.S.-China competition over 5G, the infrastructure deployment race sets the stage for a larger struggle over the application layer. Here's why enterprise IT teams should care. Continue Reading
-
Mobile device convergence brings security challenges
The trend of mobile device convergence, adding more functionality to smaller hybrid devices, is growing in intensity with the COVID-19 pandemic, and IT must be prepared for it. Continue Reading
Manage Wireless and mobile security
Learn to apply best practices and optimize your operations.
-
2021 IT priorities require security considerations
AI, IoT and 5G are among the top IT priorities for CIOs and CTOs in 2021. Is your team prepared to address each tech's security needs? Continue Reading
-
Remote data protection and DR in the work-from-home boom
Building a data protection strategy around remote working requires companies to enable employee access to data while ensuring that it is protected from threats such as shadow IT. Continue Reading
-
RSA Conference 2020 guide: Highlighting security's human element
What's happening at the 2020 RSA Conference? Our team keeps you up to date with pre-conference coverage and breaking news from the infosec world's biggest event. Continue Reading
Problem Solve Wireless and mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How to identify bloatware, then uninstall it
Unwanted pre-installed software -- also known as bloatware -- has long posed security threats for computers and other devices. Here are strategies for how to detect bloatware and uninstall the potential threat. Continue Reading
-
5 steps to get IoT cybersecurity and third parties in sync
Third parties often prove to be the weak links when it comes to IoT cybersecurity. Learn what you can do to minimize the risk while reaping the benefits that outside vendors bring. Continue Reading
-
Prevent the storage and data security risks of remote work
Many organizations have employees working from home, but some may not have taken the security and training precautions that remote work requires. Continue Reading