Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

9 ipad pro keyboard
Android Privacy Feature

data keys encryption password by gerd altmann cc0 via pixabay

The best Android password managers

Not all Android password managers are created equal — so which one makes the most sense for you?

spyware alert notification

Italian spyware firm is hacking into iOS and Android devices, Google says

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.

Android Security Settings

12 Android settings that'll strengthen your security

Some of the most important Android settings are also the most buried — and they're absolutely worth your while to uncover and put into action.

Android security

Android security checkup: 16 steps to a safer phone

Android security doesn't have to be a source of stress. These level-headed steps are all you need to keep the boogeyman at bay.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

Android Smart Lock Trusted Places

How to fix Android's Smart Lock Trusted Places feature

A 60-second workaround to make Android's location-based Smart Lock start working again.

Cloud Computing - Unified Endpoint Management U[EM]

BlackBerry says its new Digital Workplace eliminates need for VPN, VDI

BlackBerry has integrated its Desktop and Access Browser with partner Awingu's secure browser-based workspace and AI-driven security software from its acquisition of Cylance.

IDG Tech Spotlight  >  Security  >  UEM/unified endpoint management and security

UEM to marry security — finally — after long courtship

Machine learning will be key in evaluating whether a mobile device and its user should be allowed to connect to a corporate application or data silo, as user behavior becomes a part of overall endpoint security.

FinTech - Mobile Banking - Unified Endpoint Management U[EM]

BlackBerry refreshes its UEM suite, focuses on zero-trust access

BlackBerry's latest version of its flagship Enterprise Mobility Suite is aimed at enabling management of all devices and apps across all vendor platforms.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

nordvpn

Get 70% off NordVPN Virtual Private Network Service + 3 months free - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 70%, with 3 extra months on top. Use our link and see the discount applied when you click...

mdm UEM

Microsoft combines Intune with ConfigMgr

Enterprises that have System Center Configuration Manager licenses now have automatic access to Intune via the new, combined Endpoint Manager.

mobile security / unlocked data connections

Microsoft Intune can now block unauthorized BYOD hardware

Microsoft's decision to integrate third-party mobile threat defense software is a sign of bigger things to come for the company's UEM platform.

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

cloud

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

cloud
external url

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

Cloud Computing - Unified Endpoint Management U[EM]

In 2019, look for AI-enabled mobile devices – and a UEM push

As AI finds its way into mobile devices and virtual personal assistants proliferate in offices and boardrooms, IT admins will have to manage more – and more sophisticated – end points.

Load More