Threat actors could abuse the iOS URL Scheme to undermine user privacy and stage other attacks with respect to certain vendors' apps.
Security researchers observed a new variant of XLoader masquerading as Android security apps and an iOS configuration profile to target mobile users.
According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.
A new phone-based phishing scam reveals how fraudsters are devising more sophisticated schemes to prey on Apple device users.
Application developers can accelerate the pace of innovation in data security by making it easy for third parties to integrate with their platforms.
A recent attack against a cryptocurrency exchange planted a Trojan that spread across both Windows and MacOS machines to steal information and digital coins, according to security researchers.
Researchers observed 13 malware attacks targeting iPhone users in India that exploited open source mobile device management (MDM) tools to breach corporate devices.
As the mobile threat landscape has expanded over the past decade, Apple's iOS releases have added new MDM features to help security professionals protect enterprise networks.
Apple's new Device Enrollment Platform (DEP) enables the technology giant to carve out a larger presence in the enterprise space and makes managing Apple devices easier than ever.
The Face ID component is one of the most compelling new features of the iPhone X. Is facial recognition the future of authentication for the enterprise?