With enhanced features for users' personal and professional lives alike, Android 9 Pie raises the bar yet again for Google's mobile OS offering.
Researchers observed 13 malware attacks targeting iPhone users in India that exploited open source mobile device management (MDM) tools to breach corporate devices.
As the mobile threat landscape has expanded over the past decade, Apple's iOS releases have added new MDM features to help security professionals protect enterprise networks.
In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently.
As the workforce embraces mobility to increase productivity, organizations must adopt a more innovative, dynamic approach to mobile threat defense.
A decades-old mobile security flaw resurfaced in recent weeks after a U.S. senator reported that cybercriminals exploited the Signaling System 7 (SS7) protocol to breach a mobile carrier.
The key to improving identity theft awareness is to understand the risks, which include phishing attacks, digital trust abuse, poor password management, BYOD policies and more.
Emerging mobile and cloud-based technologies present many new challenges pertaining to sporting event cybersecurity.
Organizations in every industry, from banking to retail, healthcare and more, are required to apply mobile data protection rules set by governments that impose massive fines in cases of noncompliance. Until the early 2000s, it was simpler to control...
In recent years, the risks associated with passing through an airport have changed dramatically. This demands a complete rethink about mobile security best practices for international travel.