5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" — but security leaders must prepare for the coming 5G security threats.
Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
As the most widely deployed IBM SaaS solution, MaaS360 brings a strong set of unified endpoint management (UEM) capabilities for ruggedized hardware and IoT device deployments.
Is two-factor authentification (2FA) already a thing of the past — or does it have a bright future? This blog explores some of the challenges facing 2FA.
The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
Mobile threat prevention enables organizations to proactively protect their devices, users, apps and data from malicious actors.
Mobile application security has a blind spot: sensor data. Now, researchers warn this data could be used to crack user PINs.
Google's Android O version 8.0 features a safe browsing API and other functions to improve mobile application security in the enterprise.
Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.