According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.
The integrity of the applications deployed to your workforce is crucial to enterprise security. The app approval workflow helps you vet these programs and integrate them with existing tools.
5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" — but security leaders must prepare for the coming 5G security threats.
Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
As the most widely deployed IBM SaaS solution, MaaS360 brings a strong set of unified endpoint management (UEM) capabilities for ruggedized hardware and IoT device deployments.
Is two-factor authentification (2FA) already a thing of the past — or does it have a bright future? This blog explores some of the challenges facing 2FA.
The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
Mobile threat prevention enables organizations to proactively protect their devices, users, apps and data from malicious actors.
Mobile application security has a blind spot: sensor data. Now, researchers warn this data could be used to crack user PINs.