It’s no secret that hackers have a range of different malicious capabilities at their fingertips to use in the theft of sensitive personal and company information.Read More
Good communication in a family is essential and one way I encourage it is to make sure my wife and I share key mobile data, such as our smartphone contact lists. Alignment between work and home is critical, especially now that we‘re expecting our first child and need to share our medical contacts. Until now,…Read More
A BYOD program cannot be successful if decision-makers do not think about the extra protection needed to safeguard the additional mobile endpoints.
If you have a small business, you’re probably smart enough to know that you need to protect it with security software. Are you also aware that it’s just as important to keep that security updated with the latest version? Think of your current IT security like it’s a car. If you’ve had it for a…Read More
Android dominates the mobile malware conversation, but it’s worth looking at risks to jailbroken iOS devices, too.
The Heartbleed vulnerability in the OpenSSL cryptographic library has dominated cybersecurity news in recent weeks, eclipsing even the much hyped retirement of Microsoft Windows XP – but how much damage did it do?
While I was at Mobile World Congress in Barcelona last week, I had to explain a few times to different people why there is a need nowadays to protect your mobile phone. I thought, “why not make a blog out of the topic while I have it fresh?” I could be telling you how stats…Read More
It is more than 24 months since we released Trend Micro Mobile App Reputation Service. The number of malicious and high-risk mobile apps grew from a few thousand to now more than 1.4 million. The mobile security landscape continues to change. There are more than 80% of malicious mobile apps that belong to a premium…Read More
By the end of 2013, Trend Micro found a total of 1.4 million malicious and high-risk Android apps being identified. And Apple users are not immune. 2013 saw an increase in phishing attacks specifically targeting Apple users as criminals recognize the potential revenue from this install base. In 2014, mobile will become the attack vector…Read More
Microsoft’s purchase of Nokia’s mobile business and licensing of the Nokia brand will give it enormous appeal to 1st time smartphone buyers, but will it be enough?