MDM/MAM

MDM/MAM news, trend analysis and opinion

5 details you may miss in apples new macs

Maliciously crafted MKV video files can be used to crash Android phones

Researchers discovered a vulnerability in Android's mediaserver component that can be exploited by malicious apps and websites


Most Android phones can be hacked with a simple MMS message or multimedia file

Vulnerabilities in the Android multimedia framework allow attackers to remotely compromise devices with ease, a researcher said

Bogus news app used to deliver Hacking Team spy tool

Trend Micro found the app, along with exploit code and instructions, in the leaked data

BYOD users worry employers can’t keep private data safe

Workplace smartphone and tablet users worry a lot about their personal information remaining private from their employers – and only a slim majority trusts their employer to keep that data safe, according to a Harris Poll survey...

threat detection intelligence alert

How to use threat intel to boost mobile security

Integrating threat intelligence feeds with mobile device management platforms can shore up BYOD security.

mdm

Microsoft adds MDM capabilities to Office 365

Leveraging Microsoft Intune and Azure Active Directory, Microsoft extends built-in mobile device management capabilities to Office 365 commercial plans at no additional cost.

mobile device management tablet user apps

Mobile device management continues to broaden

Think 'enterprise mobility management,' which includes app and data security, among other things.

MDM features and functions compared

Use this comprehensive checklist to compare 10 of the leading mobile device management suites.

iphone enterprise

iPhone still king of enterprise mobile as usage skyrockets, study finds

Apple’s iPhones and iPads are still the most-used mobile devices in the enterprise, even as the market expands at high speed, according to a Citrix mobile analytics report released this morning.

IBM fixes serious flaw in Endpoint Manager for mobile device management

The flaw can be exploited to execute arbitrary code on the management server

Long-running Android botnet evolves, could pose threat to corporate networks

The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said

How end-to-end MDM leaves Rollins with one less pest to control

With the help of mobile device management vendor DMI, pest control company Rollins has moved its enterprise mobility strategies beyond simply disabling lost devices to offering its 5,000 business users a broader set of services.

Android ransomware 'Koler' turns into a worm, spreads via SMS

The Koler ransomware locks the device screen and displays fake messages from police agencies

New technique allows attackers to hide stealthy Android malware in images

The attack could be used to distribute malware through applications that appear harmless, researchers said

Android SMS worm Selfmite returns, more aggressive than ever

A new version of the worm is causing infected devices to send thousands of spam text messages and has spread to 16 countries so far

Four-digit passcodes remain a weak point in iOS 8 data encryption

Longer passwords would be more resistant to brute-force attacks

Is that used iPad actually stolen? Apple creates tool for would-be buyers to check

The tool will help prospective buyers of used iPhones and iPads to determine if the devices were lost or stolen

Malware program targets Hong Kong protesters using Apple devices

The program is related to an Android one that seeks to spy on activists, Lacoon Mobile Security said

security

8 cutting-edge technologies aimed at eliminating passwords

From electronic pills to digital tattoos, these eight innovations aim to secure systems and identities without us having to remember a password ever again

Load More