New & Notable
Mobile operating systems and devices News
February 08, 2019
New bug fix releases for both iOS and macOS include the anticipated FaceTime patch for the serious eavesdropping flaw in group chats as well as fixes for two iOS zero-days.
October 10, 2018
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic.
September 20, 2018
Samsung's newest smartphone, the Note 9, is similar to the Note 8 at first glance. But there are improvements under the hood, so learn about what sets it apart in this overview.
September 13, 2018
Mobile device management can be a challenge for IT admins. Discover one vendor's approach and how security can make or break an organization's MDM strategy.
Mobile operating systems and devices Get Started
Bring yourself up to speed with our introductory content
Connected car communications help safely operate autonomous vehicles. IEEE senior member Alexander Wyglinski discusses the options available. Continue Reading
A wearable computer is any small technological device capable of storing and processing data that can be worn on the body. Continue Reading
Augmented and virtual reality is cutting edge, but that shouldn't be your sole reason to deploy it. IEEE member Todd Richmond outlines three principles for design in AR/VR planning. Continue Reading
Evaluate Mobile operating systems and devices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As IT has been overwhelmed with too many tools to manage devices, UEM attempts to simplify the situation. Here's what to expect in the years to come and what organizations should do. Continue Reading
Devices are only as secure as end users enable them to be. Here's how IT can use CIS benchmarks to enforce strong iOS security standards across an organization. Continue Reading
Google made a few updates to Android Enterprise Recommended. Explore recent offerings from the proprietary Android enterprise device program, including support for rugged devices. Continue Reading
Manage Mobile operating systems and devices
Learn to apply best practices and optimize your operations.
An Apple security expert introduced the concept of synthetic clicks, which can bypass privilege escalation defenses. Find out how this new attack technique works with Nick Lewis. Continue Reading
Researchers from Check Point announced a new attack at Black Hat 2018 that targets Android devices. Discover how this attack works and how devices should be protected with Nick Lewis. Continue Reading
Malicious apps have been a consistent problem for the Google Play Store, so a new detection model has been released to help clean it up. Learn how this system works with Nick Lewis. Continue Reading
Problem Solve Mobile operating systems and devices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Using DeX, users can create a Linux desktop with their Samsung smartphones. But IT should be aware of the challenges with its deployment and management. Continue Reading
An Apple vulnerability recently resurfaced and is targeting Apple devices that are connected to public hotspots. Discover what this vulnerability is and how to protect your devices. Continue Reading
Learn about the history of OAuth and Apple and how iOS 12 changed the game for authorization. There are a few things to be wary of, too. Continue Reading