Mobile Malware

Results: 423



#Item
391Computer hardware / Disk encryption / Computer networking / Wi-Fi / Bluetooth / Wireless / USB flash drive / Universal Serial Bus / Malware / Computing / Technology / Mobile computers

The Risks of Using Portable Devices Pennie Walters Portable devices like jump drives, personal audio players, and tablets give users convenient access to business and personal data on the go. As their use increases, howe

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2013-04-15 13:11:52
392Apple Inc. / App Store / Malware / Android / Mobile apps / IOS / Antivirus software / Smartphones / Software / Computing

A Trend Micro Research Paper Fake Apps Feigning Legitimacy Symphony Luo and Peter Yan

Add to Reading List

Source URL: free.antivirus.com

Language: English - Date: 2014-07-07 04:27:20
393Malware / Smartphone / Internet privacy / Mobile phone / Webroot Internet Security Complete / Mobile business intelligence / Technology / Electronics / Digital media

Microsoft Word - Moble Phone Apps.docx

Add to Reading List

Source URL: www.denverda.org

Language: English - Date: 2012-12-14 12:17:50
394Wireless / Computing / Bluetooth / Telecommunications engineering / Malware / Personal digital assistant / Smartphone / Bluetooth profile / Proximity marketing / Technology / Mobile computers / Information appliances

DAS Information Security Office Monthly Cyber Security Tips NEWSLETTER July 2009

Add to Reading List

Source URL: www.secureonline.iowa.gov

Language: English - Date: 2010-07-14 13:03:51
395Electronic engineering / Smartphones / Mobile phones / Malware / Microsoft Kin / Mobile phone / Password / Technology / Electronics / Information appliances

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2010-06-07 11:29:19
396Computer security / Computer crimes / Communications security / Cryptography / Phishing / IT risk / Mobile device management / Malware / Internet security / Security / Computer network security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2014-07-22 09:24:11
397Mobile telecommunications / Mobile computers / Automatic identification and data capture / Mobile computing / Malware / Universal Serial Bus / Mobile phone / Bluetooth / Technology / Electronic engineering / Electronics

Microsoft Word[removed]Securing Mobile Devices.docx

Add to Reading List

Source URL: mi.gov

Language: English - Date: 2012-12-07 19:36:24
398Embedded Linux / Malware / Antivirus software / IOS jailbreaking / Android / Rooting / Opera / Defensive computing / Mobile business intelligence / Software / Computing / Smartphones

May 2014 Volume 9, Issue 5 Protecting Against Mobile Malware NH Department of Information Technology www.nh.gov/doit/cybersecurity

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2014-05-29 09:37:02
399Mobile telecommunications / Mobile computers / Automatic identification and data capture / Mobile computing / Malware / Universal Serial Bus / Mobile phone / Bluetooth / Technology / Electronic engineering / Electronics

Microsoft Word[removed]Securing Mobile Devices.docx

Add to Reading List

Source URL: www.michigan.gov

Language: English - Date: 2012-12-07 19:36:24
400Software / Windows Mobile / IPhone / Mobile commerce / Mobile apps / Malware / Mobile application development / Android Market / Symbian / Technology / Computing / Smartphones

Category 1 Unauthorized Access Watchlist

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2013-04-15 13:11:52
UPDATE