Searching all of TechTarget| 5,877 results for "android"

ComputerWeekly

Aug 05, 2016

Managing Android devices in the enterprise

This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM). Continue Reading

SearchMobileComputing

By Jack Wallen Evaluate Aug 24, 2016

Should IT allow Android users to sideload apps?

Android users can sideload apps outside of the Google Play Store, but these apps aren't screened for malware like commercial apps are. IT must urge users to proceed with caution. Continue Reading

SearchSecurity

By Lisa Phifer Manage Jun 15, 2016

Android security policies all enterprises should adopt

Securing Android devices in the enterprise can seem like an uphill task. Applying these Android security policies might reduce the struggle security professionals face. Continue Reading

SearchMobileComputing

By Matt Schulz Evaluate Jun 13, 2016

What are the top Android phones for the enterprise?

With all of the Android phones on the market, it can be hard to tell which ones are good fits for businesses. IT should make sure they can use EMM tools to control some features. Continue Reading

ComputerWeekly

By Warwick Ashford Aug 08, 2016

900 million Android devices vulnerable to attackers

Enterprises and individuals need to install security updates for all devices with vulnerable Qualcomm chip drivers if they want to ensure attackers can‘t take control of them, warns Check Point Continue Reading

ComputerWeekly

Aug 02, 2016

A security assessment of Android full-disk encryption

This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures. Continue Reading

SearchSecurity

By Michael Heller News Jul 29, 2016

Android security boosted with memory protection of Linux kernel, more

Google details how it is improving Android security with better memory protections and reduction of the Linux kernel's attack surface. Continue Reading

SearchSecurity

Get Started Jul 29, 2016

Automated Security Analysis of Android and iOS Applications

In this excerpt of Automated Security Analysis of Android and iOS Applications with Mobile Security Framework, authors Ajin Abraham and Henry Dalziel discuss mobile application penetration testing. Continue Reading

SearchMobileComputing

By Jack Wallen Manage Jul 27, 2016

Why sideloading Android apps is risky business

Android users seeking an app outside of their device's official app store can circumvent the system through sideloading. But the process puts enterprise devices and data at risk. Continue Reading

SearchSecurity

By Nick Lewis Evaluate Jul 21, 2016

How does the Mazar malware take control of Android devices?

The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks can be prevented. Continue Reading