Do you remember your first mobile phone, and the newfound feelings of connectedness and convenience that came with it? Nowadays, are these devices really phones or are they computers? Labels matter.
Security researchers observed a new variant of XLoader masquerading as Android security apps and an iOS configuration profile to target mobile users.
Today's security leaders are tasked with complying with data privacy laws and enhancing user productivity while preserving their agility and securing them from mobile application security threats.
According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.
The integrity of the applications deployed to your workforce is crucial to enterprise security. The app approval workflow helps you vet these programs and integrate them with existing tools.
5G communications networks will empower a future that some are calling the "Fourth Industrial Revolution" — but security leaders must prepare for the coming 5G security threats.
Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Researchers uncovered an adaptable Android Trojan known as GPlayed that masquerades as Google Apps to spy on and steal information from victims.
As the most widely deployed IBM SaaS solution, MaaS360 brings a strong set of unified endpoint management (UEM) capabilities for ruggedized hardware and IoT device deployments.
Is two-factor authentification (2FA) already a thing of the past — or does it have a bright future? This blog explores some of the challenges facing 2FA.