New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Wireless and mobile security News
April 06, 2018
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the OIG report's findings on the FBI's effort to unlock the iPhone of one of the San Bernardino terrorists.
February 21, 2018
Google's new program certifies devices that meet minimum hardware requirements, provide regular Android security updates and offer a consistent management experience.
February 09, 2018
News roundup: Apple's highly protected iBoot source code was leaked online. Plus, the U.S. Consumer Financial Protection Bureau stops its Equifax breach investigation, and more.
January 11, 2018
The new WPA3 Wi-Fi protocol aims to improve security for IoT devices and strengthen password security with protections against brute force attacks.
Wireless and mobile security Get Started
Bring yourself up to speed with our introductory content
Securing mobile devices in the enterprise to effectively deflect potential breaches now means enterprise mobile management must evolve into unified endpoint management. Continue Reading
Security gaps in mobile devices can be many and varied, but they must be addressed immediately. Unified endpoint management is the next-gen way to close the gaps. Continue Reading
Attacks on enterprise mobile endpoints are more lethal than ever. To help infosec pros fight back, enterprise mobile management has unified to fortify defenses. Continue Reading
Evaluate Wireless and mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With vendors expanding their horizons from just MDM to more comprehensive EMM products, it is crucial to look at these EMM vendors who offer MDM capabilities. Continue Reading
Expert Matt Pascucci examines the top mobile device management offerings to help you determine which MDM products are the best fit for your organization. Continue Reading
Mobile device management can be a crucial part of enterprise security. Expert Matt Pascucci presents the key questions to ask when investigating MDM products. Continue Reading
Manage Wireless and mobile security
Learn to apply best practices and optimize your operations.
The com.google.provision virus reportedly targets Android users, but little is known about it. Nick Lewis discusses the mystery threat and how Common Malware Enumeration may help. Continue Reading
App trackers were found in hundreds of Google Play apps. Expert Michael Cobb explains the threat they pose and how GDPR has the potential to reduce the risk. Continue Reading
Android apps affected by Tizi spyware were found in the Google Play Store by Google's Play Protect team. Expert Michael Cobb reviews the threat and how it was fixed. Continue Reading
Problem Solve Wireless and mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A new SMS malware known as ExpensiveWall was recently discovered by Check Point. Learn how it infects devices and puts Android device users at risk with expert Nick Lewis. Continue Reading
Researchers developed a tool to help prevent improper certificate pinning that causes security issues. Expert Michael Cobb reviews the issue and the Spinner tool. Continue Reading
It's important for organizations to stay current on what's new in mobile malware and to develop security policies to combat these vulnerabilities. Continue Reading