An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.
According to Forrester, unified enpoint management enables customers to initiate a low-touch, no-touch process that reduces the time and effort needed to configure endpoints by as much as 96 percent.
The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.
While smartphones and tablets have become more ubiquitous in the workplace, organizations are flat out ignoring mobile security risks.
Do you remember your first mobile phone, and the newfound feelings of connectedness and convenience that came with it? Nowadays, are these devices really phones or are they computers? Labels matter.
Smartphones running Android 7.0 and higher can now serve as two-factor authentication (2FA) tools as part of a Google 2FA strategy to boost security across its online services.
We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?
Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.
Security researchers observed a new variant of XLoader masquerading as Android security apps and an iOS configuration profile to target mobile users.
A new threat known as WinPot malware is using a slot machine-like interface to empty ATMs at targeted financial institutions.