Mobile Malware

Results: 423



#Item
341System software / Antivirus software / Malware / Android / IOS jailbreaking / Rooting / Defensive computing / Mobile business intelligence / Computing / Software / Smartphones

May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware Enterprise Security and Risk Management Office Monthly Security Tips

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2014-06-02 11:43:47
342Computer security / Computer network security / Application firewall / Antivirus software / Malware / McAfee / Rackspace Cloud / Mobile cloud computing / Computing / Cloud computing / Centralized computing

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:43:09
343Computer security / Malware / Rootkit / Hypervisor / Loadable kernel module / Linux kernel / Operating system / Keystroke logging / Ring / System software / Software / Computer architecture

Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection Jeffrey Bickford H. Andrés Lagar-Cavilla

Add to Reading List

Source URL: lagarcavilla.org

Language: English - Date: 2011-04-29 10:04:42
344Text messaging / Internet privacy / Computing / Mobile security / Electronic commerce / Mobile business intelligence / Bolt / Technology / Smartphones / Malware

    Safety Tips for Mobile Devices   

Add to Reading List

Source URL: www.salisbury.edu

Language: English - Date: 2014-03-17 12:10:12
345Malware / Password / USB flash drive / Email / Mobile Web / Mobile business intelligence / Computing / Internet / Technology

National Cyber Security Centre NCSC Security Advisory – NCSC-ADV[removed]October 2013

Add to Reading List

Source URL: www.ncsc.govt.nz

Language: English - Date: 2013-11-14 00:22:44
346Embedded Linux / Antivirus software / Freeware / Mobile device management / Malware / Network security / Android / Bring your own device / Opera / Software / Computing / Smartphones

ThreatTrack_Security_logo_colors

Add to Reading List

Source URL: www.threattracksecurity.com

Language: English - Date: 2014-05-27 14:15:23
347Espionage / Sunbelt Software / Malware / Spyware / Avira / Antivirus software / System software / Computer security

Case Study: Mitsubishi Polysilicon Organization: Mitsubishi Polysilicon, Mobile, Alabama

Add to Reading List

Source URL: www.threattracksecurity.com

Language: English - Date: 2014-02-09 21:00:26
348Computer security / National security / Computer crimes / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Vulnerability / Malware / Attack / Critical infrastructure / Cyberwarfare / Security / Computer network security

Office of Emergency Communications (OEC) Mobile Applications for Public Safety (MAPS) PSCR Public Safety Broadband Stakeholder Conference June 4th, 2014 Alex Kreilein

Add to Reading List

Source URL: www.pscr.gov

Language: English - Date: 2014-06-02 16:30:50
349Wireless / Mobile telecommunications / Mobile computers / Bluetooth / Malware / Mobile computing / Near field communication / Mobile phone / Wi-Fi / Technology / Electronic engineering / Electronics

Provided by Justin O’Hara, IT Consultant Securing Mobile Devices Big Things Come in Small Packages! Mobile computing devices include mobile phones, IP phones, pagers, BlackBerry devices, iPhones, smart phones, and por

Add to Reading List

Source URL: www.mtas.utk.edu

Language: English - Date: 2013-11-21 09:25:00
350Information appliances / Hardware restrictions / Android / Malware / Mobile security / Mobile operating system / Mobile application development / Mobile apps / Antivirus software / Computing / Smartphones / Software

Juniper Networks Third Annual Mobile Threats Report March 2012 through March 2013 Table of Contents 03 Executive Summary

Add to Reading List

Source URL: www.juniper.net

Language: English - Date: 2013-07-25 02:16:24
UPDATE