Mobile Device Security

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Mobile security policy useless if not enforced

    Strong mobile policies have become necessary to ensure mobile security. But security policies aren't worth the paper they're printed on if they're not enforced. 

  • "Mobile Computing," Chapter 18: Security issues in mobile computing

    This chapter discusses different techniques to secure information over mobile computing environments. 

  • SMS phishing is here

    Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams. 

  • BlackBerry vulnerability, mobile viruses are real threats

    At this month's Black Hat conference, a presentation centered around BBProxy, a hacking program that can take advantage of the trust relationship between a BlackBerry and an enterprise's internal server to hijack network connections.

    That, couple... 

  • Mobile security starts with policy

    Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy. 

  • Laptop hacking step by step

    Laptops with sensitive data are getting stolen every day. Contributor Kevin Beaver says the best way to secure your laptops is to understand how they will be attacked. He provides the basic attack methods and a set of contingencies in this step-by-st... 

  • Stolen VA laptop found

    It remains to be seen if personal data on millions of veterans and active duty personnel was copied from the laptop or compromised in any other way. 

  • Mobile viruses -- Overview

    Learn about mobile viruses and understand the risks mobile devices bring to your enterprise and how to safeguard against mobile malware. 

  • A new era of computer worms: Wireless mobile worms

    In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. 

  • Best practices for protecting handhelds from mobile malware

    Mobile malware such as the Cabir worm and Dust virus indicate that it's a good idea to put sound handheld security practices in place now, although antivirus software for handhelds and mobile phones may not be worth the investment.