Mobile threats News
November 29, 2017
An Apple macOS flaw in High Sierra could allow an attacker to bypass any authentication dialog, including signing in to a system as a full root user.
November 08, 2017
The latest security release from Google patched the Android KRACK vulnerability affecting Wi-Fi's WPA2 protocol, but update confusion leaves users unsure if they are safe.
October 23, 2017
Macs are gradually making their way into traditional organizations, so IT professionals are now looking for improved Mac management capabilities.
October 27, 2016
A Riverbed software update blends SteelCentral; Gigamon intros a security appliance; Check Point warns of 2017 ransomware threats.
Mobile threats Get Started
Bring yourself up to speed with our introductory content
In lieu of installing all apps directly on users' desktops and mobile devices, IT has a plethora of options to deliver applications -- desktop and application virtualization, desktop as a service, web apps and hybrid strategies. Each method comes with advantages and drawbacks when it comes to security, compatibility, cost and development complexity. This month's cover story of Access magazine delves into these issues to help you figure out what's best for your different applications.
In a column, our enterprise desktop expert explains when it's better to deliver full desktops versus single applications. And along with determining how to deliver applications, it's critical to focus on the back-end infrastructure. Another column this month explores what to consider for the third-party systems behind mobile specifically. The Deep Dive looks at mobile threat detection technology and why it hasn't reached critical mass yet. Finally, the new App Spotlight shines on Slack, a growing option for enterprise collaboration.Continue Reading
EMM configurations can help safeguard the enterprise from attacks, but mobile threat detection tools take a different approach to actively pinpoint security issues. Continue Reading
Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge. Continue Reading
Evaluate Mobile threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Many CISOs are now in the hot seat, seeking better ways to embrace mobility while combating high-priority mobile security threats. As mobile devices become productivity tools, security professionals need to pay attention to data classification and mobile risk assessment. Failed attempts to safeguard enterprise data by banning mobile data access or locking down smartphones and tablets demonstrate a pressing need for more effective strategies against mobile security threats. We explore pitfalls to avoid and best practices that have proven effective. Learn about emerging technologies -- from containerized apps to context-aware policies -- that can help your enterprise stop costly mobile data leaks.
Integration and better performance is the name of the game as enterprise firewalls offer greater visibility, next-generation IPS and advanced threat functionality without slowing down the network. We asked readers who plan to invest in security technology in the next the 12 months which enterprise firewalls and advanced threat detection tools made it onto their short lists. We unveil Readers’ Top Picks for enterprise firewalls from perimeter to next generation systems. We also ask them about the layers of defense, namely advanced threat detection, that they seek for these security appliances. Finally, keeping up with technology advances can become a full-time job. We ask CISOs what strategies they adopt to follow the latest tech and how they find benchmarks to determine its enterprise effectiveness. Continue Reading
At RSA 2015, Appthority president and co-founder Domingo Guerra outlines emerging mobile security risks enterprises must be aware of -- and the issues aren't limited to just bring your own devices (BYOD). Continue Reading
Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Continue Reading
Manage Mobile threats
Learn to apply best practices and optimize your operations.
In this Risk & Repeat podcast, SearchSecurity talks with James Plouffe, lead solutions architect at MobileIron and a technical advisor for the television series 'Mr. Robot.' Continue Reading
Mobile healthcare apps are convenient and prevalent, but they also potentially open up risky security pitfalls for hospitals and physician practices. Continue Reading
While cookies can be helpful, mobile persistent cookies can pose a serious threat to users and enterprises. Expert Michael Cobb explains how to mitigate the risk and eliminate the threat. Continue Reading
Problem Solve Mobile threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A variety of malware that steals passwords from jailbroken iPhones and iPads is becoming an enterprise concern. Expert Nick Lewis explains how to mitigate the risk. Continue Reading
A recent proof of concept shines new light on the future of mobile keyloggers. Michael Cobb reviews how to keep touchscreen devices safe from attack. Continue Reading
As mobile application security threats take on serious proportions, we explore the issues and risks involved for users and enterprises. Continue Reading