Mobile Malware

Results: 423



#Item
221Electronic commerce / Smartphones / Android / Mobile telecommunications / Malware / SMS / Spyware / Mobile payment / Near field communication / Technology / Computing / Mobile technology

Security Response Motivations of Recent Android Malware Eric Chien Technical Director, Security Response

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2011-10-11 07:03:39
222Information appliances / Hardware restrictions / Android / Malware / Mobile security / Mobile operating system / Mobile application development / Mobile apps / Antivirus software / Computing / Smartphones / Software

Juniper_Malware_Infobite_v11

Add to Reading List

Source URL: assets.nationaljournal.com

Language: English - Date: 2013-06-26 08:10:48
223Mobile apps / Internet privacy / Technology / Smartphones / Malware / Fusionopolis

02 - Fingerprint Biometrics Liveness Detection

Add to Reading List

Source URL: www.i2r.a-star.edu.sg

Language: English - Date: 2014-10-30 23:05:08
224Smartphones / Antivirus software / Social engineering / Malware / Spyware / Android / Phishing / Trend Micro Internet Security / Software / System software / Computing

Mobile Security Apps Hendrik Pilz Director Technical Lab / Mobile Security [removed] Mobile Security Apps

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2012-04-14 08:23:52
225Cyberwarfare / Antivirus software / Rogue software / Computer network security / Smartphone / Spyware / Ransomware / Adware / Mobile security / Malware / System software / Espionage

20 14 MO BILE THREAT REPORT Introduction In 2013 the notable trend in mobile security was the geographic diversification of mobile threats,1 such as the prevalence of chargeware in Western Europe, where the popularity o

Add to Reading List

Source URL: www.lookout.com

Language: English - Date: 2015-02-12 18:17:44
226Mobile technology / Smartphones / .mobi / Malware / Twitter / Mobile device / Internet privacy / Mobile phone / Mobile cloud computing / Technology / Information appliances / Electronics

An application to estimate the Cyber-risk Detection Skill of mobile device users. (Novel idea presentation) Guillaume Schaff itrust consulting (Luxembourg) [removed] Carlo Harpes

Add to Reading List

Source URL: www.iaria.org

Language: English - Date: 2013-12-10 21:37:25
227Malware / Computing / IOS jailbreaking / Enterprise mobility management / Android / Rooting / Smartphones / Software / Technology

MaaS360.com > Data Sheet IBM MaaS360® Mobile Threat Management Stop mobile malware on iOS and Android devices Mobile Malware Prevention

Add to Reading List

Source URL: content.maas360.com

Language: English - Date: 2015-01-21 10:35:30
228Mobile device management / Mobile technology / Mobile enterprise / Consumerization / Smartphone / Mobile device / Mobile computing / Nokia / Malware / Technology / Information appliances / Personal digital assistants

Report based on discussions with the Dr. Martijn Dekker, Senior Vice President, Chief Information Security Officer

Add to Reading List

Source URL: www.security-finder.ch

Language: English - Date: 2012-10-29 08:59:33
229Symbian / Windows Mobile / Opera / Software / Smartphones / Malware

Who targets the journalists? and how? A review of the attack surface in our digital society TLP:WHITE [removed]

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2014-03-28 07:10:33
230Computer security / Trapster / Mobile application development / Malware / Computing / Software engineering / Application security

Mobile Security Application Challenges SANS AppSec 2011

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:52
UPDATE