Mobile Security

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Oracle Mobile Security Suite rehashes Identity Manager and Bitzer Mobile

    Michelle Malcher, president of IOUG, discusses Oracle Mobile Security Suite and how using pre-existing technology can be a value-add.

  • local wipe

    Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration. A local wipe may be automatically conducted in response to a number of failed login attempts.

  • geotagging

    Geotagging is the addition of geographical information, usually in the form of latitude and longitude coordinates, to Web sites, images, videos, smartphone transmissions, and various other data types and sources. Sometimes geotagging includes place names such as street addresses, towns, postal zip codes, or telephone area codes.

  • iOS Erase

    iOS Erase is a feature that obliterates everything stored in the iOS encrypted file system’s user partition. All user partition contents – including contacts, calendars, device settings, third-party applications, and associated application data – become cryptographically inaccessible.

  • Android Factory Reset

    Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from the factory.

  • enterprise wipe

    Enterprise wipe is a security feature offered by many Mobile Device Management (MDM) products which selectively erases only those device settings, user data, applications, and application data that were previously installed by that MDM.

  • jailbreaking

    Jailbreaking, in a mobile device context, is the use of an exploit to remove manufacturer or carrier restrictions from a device such as an iPhone or iPad. The exploit usually involves running a privilege escalation attack on a user’s device to replace the manufacturer’s factory-installed operating system with a custom kernel.

  • PIN lock

    The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used.

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.

  • discoverability

    Discoverability is the capacity of something to be found. The term is used in many different contexts in IT (information technology).

  • VIEW MORE ON : Mobile Device Security
  • hard reset (factory reset; master reset)

    A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory. All settings, applications and data added by the user are removed.

  • iOS Erase

    iOS Erase is a feature that obliterates everything stored in the iOS encrypted file system’s user partition. All user partition contents – including contacts, calendars, device settings, third-party applications, and associated application data – become cryptographically inaccessible.

  • Android Factory Reset

    Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from the factory.

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.

  • Remote access problems: BYOD muddies the water

    BYOD enterprise policies are creating new remote access problems on the WAN. Find out how to get a better handle on iPads and smartphones invading your VPN.

  • Mobile application security best practices: Leveraging MDM, MAM tools

    Following mobile application security best practices can aid IT's mobile application management efforts and mitigate the risks of employees installing mobile apps on their devices.

  • Managing mobile application security in the BYO device era

    Users love downloading apps, which can make mobile application security, especially on employee-owned BYO devices, difficult to ensure. Find out how to improve mobile app security.

  • Mobile device strategy bypassed as enterprises face tablet invasion

    The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis.

  • What to look for in mobile device management systems

    Learn about the core functions of mobile device management (MDM) systems so you can select the most comprehensive MDM system for your enterprise needs.

  • Accessing mobile unified communications with virtual desktops

    Running virtual desktops for mobile unified communications provides users across many platforms access to the same UC apps available on their laptops or desktops. Learn about the benefits and challenges of integrating virtual desktops, unified communications and mobile devices.

  • VIEW MORE ON : Mobile Policies and Procedures
  • PIN lock

    The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used.

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.

  • Sybase offers enterprise-ready iPhone solution on the App Store

    Sybase yesterday announced a new version of iAnywhere Mobile Office with expanded iPhone support and availability on the iPhone App Store. Sybase's approach for enhanced security and usability make it the first in the middleware space to encrypt all data contained within an email and PIM application on an iPhone without compromising user's personal information. The latest version is intended to strengthen iPhone adoption within enterprises by providing Lotus Domino and Microsoft Exchange email and PIM data to iPhone users.

  • Two-factor authentication: Mobile security at your fingertips

    Two-factor authentication -- the security process that requires two means of identification, one of which is usually a physical token such as a fingerprint, the other typically being a password -- is more complex than using just one authentication method, but it's a lot more secure. In this tip, Craig Mathias describes why fingerprint recognition is the key to really effective security for essentially all mobile applications.

  • RIM makes hostile takeover bid for encryption vendor Certicom

    BlackBerry maker RIM is looking to gain more control over the security components of its platform by launching a hostile takeover of Certicom, a vendor of encryption technology for the BlackBerry and many other mobile platforms.

  • Open System Authentication (OSA)

    Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive files that are not encrypted... (Continued)

  • In-the-cloud defenses for mobile malware

    Mobile antivirus programs apply laptop best practices to PDAs and smartphones, but there are many other ways to protect corporate assets from mobile malware. Complementary "in the cloud" defenses include enterprise sync servers, network gateways and wireless services that incorporate mobile malware filtering. Learning from experience: Our decade-long fight against Win32 malware has shown that PC-resident virus/spyware scanners and spam/phishing filters are necessary but inefficient. Keeping those programs and signatures current has become an onerous, time-sensitive chore.

  • iPhone encryption is a must for the security-conscious enterprise

    Apple is advertising the iPhone 3G as something that consumers can use at work. IT managers with high security requirements beg to differ. They want full device encryption and centralized policy enforcement before they'll even let one in the building.

  • LEAP (Lightweight Extensible Authentication Protocol)

    LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections... (Continued)

  • CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

    Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol that forms part of the 802.11i standard for wireless local area networks (WLANs), particularly those using WiMax technology... (Continued)

  • VIEW MORE ON : Mobile Authentication and Encryption
  • Oracle Mobile Security Suite rehashes Identity Manager and Bitzer Mobile

    Michelle Malcher, president of IOUG, discusses Oracle Mobile Security Suite and how using pre-existing technology can be a value-add.

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.

  • Mobile application security best practices: Leveraging MDM, MAM tools

    Following mobile application security best practices can aid IT's mobile application management efforts and mitigate the risks of employees installing mobile apps on their devices.

  • Managing mobile application security in the BYO device era

    Users love downloading apps, which can make mobile application security, especially on employee-owned BYO devices, difficult to ensure. Find out how to improve mobile app security.

  • Ensuring secure and compliant enterprise mobile video platforms

    Ensuring security and compliance of mobile video platforms both internally and externally is an important part of an enterprise mobile video conferencing strategy.

  • Wireless Transport Layer Security (WTLS)

    Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications.

  • On-device defenses for mobile malware

    As workforces grow increasingly dependent on smartphones, mobile threats warrant serious consideration. As discussed last month, mobile malware barriers are falling fast, at precisely the time when mobile users are becoming a bigger, juicier target. When the mobile malware "tipping point" is reached, will your organization be ready? Conventional Win32 malware defenses are commonly deployed on the assets they protect: PCs. Antivirus scanners, host intrusion detection programs, personal firewalls, and email spam filters are all designed to stop viruses, worms, trojans and spyware that prey upon desktops and laptops. These "on device" defenses are generally accepted security best practices, widely used by both businesses and individuals.

  • PEAP (Protected Extensible Authentication Protocol)

    PEAP (Protected Extensible Authentication Protocol) is a version of EAP created to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control... (Continued)

  • Sybase adds antivirus and firewall to mobile management suite

    Sybase iAnywhere is expanding its mobile security capabilities. With the rise of mobile malware, a smartphone doesn't have to be stolen or lost to be vulnerable to attack. With new antivirus and firewall features, the company is taking its Afaria mobile management and security suite beyond the lockdown and encryption features that have traditionally focused on securing lost or stolen devices.

  • Symbian: Protect your data, not just your device

    As handheld devices become more common, protecting the data stored on them becomes a primary concern. Fortunately, mobile operating systems now include security features that enterprises can use to enforce corporate policies. In this series, we explore data protection on today's most popular handheld devices, starting with Symbian.<

  • VIEW MORE ON : Mobile Security Software and Tools
  • How can I ensure app store security for my remote users?

    Our VPN security and remote access expert explains how to protect against application store threats in this Ask the Expert response.

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.

  • Mobile device security overview

    Mobile device manufacturers and operating system developers vary in their security capabilities. This list evaluates how the leading mobile devices stack up in security.

  • Mobile patching is No. 1 challenge of mobile device security

    Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security.

  • Mobile security threats

    Mobile security threats come in many forms, and they continue to evolve. IT needs to be prepared to handle mobile device security and protect smartphones from malware, eavesdropping, unauthorized access, theft and more. This tip outlines the mobile security threats facing the mobile enterprise and review sthe key requirements for building your mobile device security toolkit and examine the solutions available.

  • Smartphone security: The growing threat of mobile malware

    The increasingly pervasive use of wireless handhelds in the enterprise is just one reason why malware pros are getting serious about mobile malware. Lisa Phifer details all the reasons why smartphone and PDA viruses and malware may be on the rise, and measures enterprises can take to protect the sensitive data they often contain.

  • Is malware coming to a smartphone near you?

    Mobile malware has grown increasingly malicious and financially motivated. In this tip, you'll learn the history of mobile malware and how it can sneak in your back door.

  • When will attackers go mobile?

    Mobile malware has not been the great threat that many independent security experts have predicted, but they still predict the threat will come.

  • Mobile viruses evolving beyond just 'nuisance'

    Mobile viruses are evolving beyond being considered a nuisance into a true threat to security, privacy and compliance.

  • Protecting your corporate laptops

    In this special report, you'll discover how to protect your laptops from hackers and thieves and learn what to do if one of your corporate laptops is stolen. You'll also find information to help your employees safeguard their laptops while traveling.

  • VIEW MORE ON : Hackers and Threats to your Mobile Enterprise