Top 5 Mobile Security Threats

  • Source: Ziff Davis
  • Written By:
  • Published:
  • (Originally Published On:) )
While mobile malware still accounts for a mere fraction of the millions of threats targeting personal computers, the past year has seen the explosive growth of malicious code. What’s worse is that 50 percent of employees currently use their mobile devices at work. Early recognition of mobile security threats is a company’s best line of defense. Here are today’s top 5 mobile security threats and how to stop them in their tracks.

Featured Software Research:

Top 5 Considerations for Your Next Phone System

All businesses need a phone system, and today’s phone systems are based more on software than hardware. This guide has been prepared to outline the top considerations in selecting a phone system. Read More

Quick Take: Pulse Secure Spins Off, Immediately Acquires MobileSpaces

After network infrastructure provider Juniper Networks sold secure gateway Junos Pulse, this led to the creation of Pulse Secure. The security provider immediately acquired mobile application security company Mobile Spaces. What does this mean for security and risk management companies and professionals interested in strengthening mobile security within their business? This report from Forrester Research looks at the acquisition and its implications. Read More

You may also be interested in these related documents:

5 Best Practices for Managing Security on Mobile Devices

As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and loss. In order to mitigate this risk, Focus Experts Amy Babinchak, Martyn Davies, Bob Egan, Rasib Hassan Khan, Josh Lipton, and Ken Wineberg offer their top 6 best practices for managing security on mobile devices. Read More

Converged Threats on the Security Landscape

The pervasiveness of malware on the Internet creates more opportunities for mixing and matching dangerous content than previously possible. A converged threat is a combination of viruses, spyware, phishing, spam, and other attempts to exploit vulnerabilities. But you can’t sever all ties with the Internet—you need better protection methods to head off potential threats before they reach their targets. Learn more. Read More

How to Analyze Malware

Companies using traditional means cannot cost-effectively respond to daily threats. Analyzing such threats is cumbersome and time-consuming, involving multiple applications for code analysis, as well as a network of computers. Emerging threats cannot be addressed by the same human resources as in the past. Learn how those expert skills and knowledge have been transferred to a data security system with artificial intelligence. Read More
 
comments powered by Disqus