Mobile Security

Mobile Security | News, how-tos, features, reviews, and videos

spyware alert notification
Android Privacy Feature

Android Security Settings

12 Android settings that'll strengthen your security

Some of the most important Android settings are also the most buried — and they're absolutely worth your while to uncover and put into action.

Android security

Android security checkup: 16 steps to a safer phone

Android security doesn't have to be a source of stress. These level-headed steps are all you need to keep the boogeyman at bay.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

android anti virus security

Android security: Analysis, advice, and next-level knowledge

Expand your Android security knowledge with this comprehensive collection of level-headed resources.

Android Smart Lock Trusted Places

How to fix Android's Smart Lock Trusted Places feature

A 60-second workaround to make Android's location-based Smart Lock start working again.

Cloud Computing - Unified Endpoint Management U[EM]

BlackBerry says its new Digital Workplace eliminates need for VPN, VDI

BlackBerry has integrated its Desktop and Access Browser with partner Awingu's secure browser-based workspace and AI-driven security software from its acquisition of Cylance.

IDG Tech Spotlight  >  Security  >  UEM/unified endpoint management and security

UEM to marry security — finally — after long courtship

Machine learning will be key in evaluating whether a mobile device and its user should be allowed to connect to a corporate application or data silo, as user behavior becomes a part of overall endpoint security.

security threats and vulnerabilities

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).

FinTech - Mobile Banking - Unified Endpoint Management U[EM]

BlackBerry refreshes its UEM suite, focuses on zero-trust access

BlackBerry's latest version of its flagship Enterprise Mobility Suite is aimed at enabling management of all devices and apps across all vendor platforms.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

mdm UEM

Microsoft combines Intune with ConfigMgr

Enterprises that have System Center Configuration Manager licenses now have automatic access to Intune via the new, combined Endpoint Manager.

mobile security / unlocked data connections

Microsoft Intune can now block unauthorized BYOD hardware

Microsoft's decision to integrate third-party mobile threat defense software is a sign of bigger things to come for the company's UEM platform.

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

google chromebook in the enterprise buildings city getty images google

Will Chromebooks rule the enterprise? (5 reasons it may)

Google schooled Apple and Microsoft in the education market by growing market share from zero to 60 in eight years. Insider Pro columnist Mike Elgan examines whether Google can do it again in the enterprise.

mobile security threat detection

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

cloud

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

cloud
external url

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security.

data keys encryption password by gerd altmann cc0 via pixabay

The best Android password managers

Not all Android password managers are created equal — so which one makes the most sense for you?

Load More
Recommended for You