Mobile Device Security
195 views | +0 today
Follow
Mobile Device Security
Securing mobile devices that access corporate network.
Curated by aap3
Your new post is loading...
Your new post is loading...
Scooped by aap3
Scoop.it!

Bring Your Own Device (BYOD): 10 Reasons Why It’s a Good Idea | eLearning tools

Bring Your Own Device (BYOD): 10 Reasons Why It’s a Good Idea | eLearning tools | Mobile Device Security | Scoop.it
Bring Your Own Device (BYOD): 10 Reasons Why It’s a Good Idea | @scoopit http://t.co/mcJ0bK8e #edchat #byod
more...
No comment yet.
Scooped by aap3
Scoop.it!

Identity: the Intersection of Cloud, Mobile and Social - Forbes

Identity: the Intersection of Cloud, Mobile and Social - Forbes | Mobile Device Security | Scoop.it
Identity: the Intersection of Cloud, Mobile and SocialForbesThese “Big Three” are being driven by the “consumerization” of technology trend — Bring Your Own Devices (“BYOD”) for mobile, Bring Your Own Apps (“BYOA”) for cloud and...
more...
No comment yet.
Scooped by aap3
Scoop.it!

FBI warns vs new Android malware | SciTech | GMA News Online ...

Owners of smartphones running Google's Android operating system were warned over the weekend against a new malware posing as a work-at-home ad.
more...
No comment yet.
Scooped by aap3
Scoop.it!

Are Android phones facing a remote-wipe hacking pandemic? - CSO Magazine (blog)

Are Android phones facing a remote-wipe hacking pandemic? - CSO Magazine (blog) | Mobile Device Security | Scoop.it
Are Android phones facing a remote-wipe hacking pandemic?CSO Magazine (blog)That's the worry going around since self-confessed Kiwi geek Dylan Reeve put a "test your mobile phone for imminent disaster" page on his website.
more...
No comment yet.
Scooped by aap3
Scoop.it!

New Developments in Mobile Security

New Developments in Mobile Security | Mobile Device Security | Scoop.it
Bring Your Own Device Policies: Because of the infiltration of mobile devices into enterprises and businesses many companies have begun instituting Bring Your Own Device (BYOD) policies. These policies dictate appropriate ...
more...
No comment yet.
Scooped by aap3
Scoop.it!

BYOD and the Implications for IT - CIO

BYOD and the Implications for IT - CIO | Mobile Device Security | Scoop.it
BYOD and the Implications for ITCIOThe predictions that many industry pundits have been making about the rise of Bring Your Own Device (BYOD) are coming to fruition.
more...
No comment yet.
Scooped by aap3
Scoop.it!

Warning: Fake Facebook Photo Notifications Contain Malware

Warning: Fake Facebook Photo Notifications Contain Malware | Mobile Device Security | Scoop.it
Emails that purport to be from Facebook and say you've been tagged in a photo may be malware, according to a security expert.
more...
No comment yet.
Scooped by aap3
Scoop.it!

BYOD (Bring your own device... the pros and cons) Part 1 | Web ...

BYOD (Bring your own device... the pros and cons) Part 1 | Web ... | Mobile Device Security | Scoop.it
There is lots of buzz around BYOD (Bring Your Own Device) this year. Many businesses are embracing BYOD, and others are staying well clear – but what are the pros and cons of allowing employees to drive the technology ...
more...
No comment yet.
Scooped by aap3
Scoop.it!

Data loss: Navy to take action against officers - Daily Pioneer

Data loss: Navy to take action against officers - Daily Pioneer | Mobile Device Security | Scoop.it
Data loss: Navy to take action against officersDaily PioneerThe Navy will take action against some officers after an incident of hacking of computers in the Eastern Naval Command, Vishakhapatnam came to notice...China hackers enter Navy computers,plant...
more...
No comment yet.
Scooped by aap3
Scoop.it!

Homeland Security warns of increasing DDoS attacks on web | The ...

“Unfortunately, mobile-device security hasn't kept pace. Mobile devices are not only susceptible to malware infections, but can also be used by the bad guys to download free attack tools. That's right; you can launch a DDoS attack from most ...
more...
No comment yet.
Scooped by aap3
Scoop.it!

Flame malware: So big, so overlooked – CNET | The Powers That Beat

Flame malware: So big, so overlooked – CNET | The Powers That Beat | Mobile Device Security | Scoop.it
How did everyone miss Flame? by Michael Lee, zdnet.com.auMay 29th 2012 analysis The most “complex malware ever found” — Flame — has taken the information security world by surprise. Given that it is said to have ...
more...
No comment yet.
Scooped by aap3
Scoop.it!

Israel Matzav: Flame doesn't just collect data: It deletes files

Israel Matzav: Flame doesn't just collect data: It deletes files | Mobile Device Security | Scoop.it
Iran had previously blamed Flame for causing data loss on computers in the country's main oil export terminal and Oil Ministry. But prior to Symantec's discovery, cyber experts had only unearthed evidence that proved Flame ...
more...
No comment yet.
Scooped by aap3
Scoop.it!

Smartphones seeing malware explosion: Security software cos - Economic Times

Smartphones seeing malware explosion: Security software cos - Economic Times | Mobile Device Security | Scoop.it
Smartphones seeing malware explosion: Security software cosEconomic TimesSmartphones are becoming more vulnerable to attacks by cybercriminals looking for prey beyond the PC and targetting mobiles, especially those using Android ...Now, cybercriminals...
more...
No comment yet.
Scooped by aap3
Scoop.it!

Is Bring Your Own Device - BYOD - Changing Your Company? [Survey]

Is Bring Your Own Device - BYOD - Changing Your Company? [Survey] | Mobile Device Security | Scoop.it
The growing trend of Bring Your Own Device (BYOD) to the workplace is having dramatic effects on corporate IT plans, policies and staffing. ReadWrite wants to know how your company is dealing with employees using their own devices for work purposes.
more...
No comment yet.
Scooped by aap3
Scoop.it!

Mobile Security Decision-Makers Report BYOD Threats Have ...

... finds that the vast majority of organizations that allow employees to BYOD (bring your own device) are experiencing high rates of mobile threats, including lost or stolen devices, malware, and compromised company data.
more...
No comment yet.
Scooped by aap3
Scoop.it!

Smartphone Users be Aware of Malware Targeting Mobile Devices - Kansas City infoZine

RushPRnews.comSmartphone Users be Aware of Malware Targeting Mobile DevicesKansas City infoZineWashington, D.C. - infoZine - The IC3 has been made aware of various malware attacking Android operating systems for mobile devices.
more...
No comment yet.
Scooped by aap3
Scoop.it!

Should Your Office Go BYOD (Bring Your Own Devices?) | Arnolds ...

Should Your Office Go BYOD (Bring Your Own Devices?) | Arnolds ... | Mobile Device Security | Scoop.it
Many companies are solving this problem by instituting Bring Your Own Device policies, in which workers can choose their own mobile devices. Some organizations even offer a BYOD stipend to cover the expenses of ...
more...
No comment yet.
Scooped by aap3
Scoop.it!

ZeuS (the virus not the god) is not dead and living in your phone - Examiner.com

ZeuS (the virus not the god) is not dead and living in your phone - Examiner.com | Mobile Device Security | Scoop.it

V3.co.ukZeuS (the virus not the god) is not dead and living in your phoneExaminer.comThe malware known as ZeuS (and the botnet) may be alive and well in your smartphone. ZeuS has popped up again in an unlikely place - your RIM device or Blackberry.

 

more...
No comment yet.
Scooped by aap3
Scoop.it!

The Bring Your Own Device Divide | Employer Solutions Blog - Sage HRMS

The Bring Your Own Device Divide | Employer Solutions Blog - Sage HRMS | Mobile Device Security | Scoop.it
The key to solving issues with the bring your own device divide is collaboration which, while facilitated by BYOD programs themselves, can be difficult to promote acceptance with at first.
more...
No comment yet.
Scooped by aap3
Scoop.it!

Network security in the BYOD era | Network-7 : Cyberwarfare ...

The bring your own device (BYOD) phenomenon may be consumer-led, it may be tempting to also pass along network and data security onto employees, but doing so would lull you into a false sense of security.
more...
No comment yet.
Scooped by aap3
Scoop.it!

How secure are your mobile devices? - WordPress.com logo

How secure are your mobile devices? - WordPress.com logo | Mobile Device Security | Scoop.it
Information Week has published an interesting report, 2012 State of Mobility Security. Their study showed that 90% thought mobile devices were a threat to their network. The top concern by far was loss or infection of a device ...
more...
No comment yet.
Scooped by aap3
Scoop.it!

Should Your IT Department Embrace the Bring Your Own Device ...

Should Your IT Department Embrace the Bring Your Own Device ... | Mobile Device Security | Scoop.it
One of the fastest growing trends in technology is that of bringing your own devices to work. These devices could be phones, laptops, or even complete home offices that you use to telecommute to work.
more...
No comment yet.
Scooped by aap3
Scoop.it!

BYOD – Bring Your Own Device

BYOD – Bring Your Own Device | Mobile Device Security | Scoop.it
Where employees once enquired about private medical cover and company cars, now they may ask to work on their own iPhone or Android. It’s a perk of the job that can boost productivity, but im...
more...
No comment yet.
Scooped by aap3
Scoop.it!

13 ways to guard against mobile device risks | Government Health IT

#security 13 ways to guard against mobile device risks: "As threat risks continue to grow for mobile devices in ...
more...
No comment yet.
Scooped by aap3
Scoop.it!

With iOS 6, Apple Is Now Requiring Permission For Apps To Access Personal Data | Cult of Mac

With iOS 6, Apple Is Now Requiring Permission For Apps To Access Personal Data | Cult of Mac | Mobile Device Security | Scoop.it
more...
No comment yet.