Mobile Device Management (MDM)

Mobile Device Management (MDM) news, analysis, research, how-to, opinion, and video.

Long-running Android botnet evolves, could pose threat to corporate networks

The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said

byod illustration 2

How End-to-End MDM Leaves Rollins With One Less Pest to Control

With the help of enterprise mobility system provider DMI, pest control company Rollins has moved its enterprise mobility strategies beyond simply disabling lost devices to offering its 5,000 business users a broader set of services.

business intelligence

Business Intelligence Meets Mobility at eHarmony

As online dating site eHarmony has expanded its mobile presence, it has also made good use of its business intelligence platform. This provides better visibility into what mobile users are doing and what services are better off being...

Vulnerability Leaves iPhones Open to Fake App Attack

Attackers can replace legitimate apps with fake ones that access and steal personal information

HP's BYOD Service Protects Mobile Devices and PCs

HP Touchpoint Manager is for SMBs, with plans starting at $2 per month

Why Your Workers Hate BYOD

If CIOs and other IT leaders have any doubt that employees are down on BYOD, senior writer Tom Kaneshige clears up any confusion.

The iPhone WireLurker Malware - What You Need to Know

The malware is using new methods to target Apple users, but should you be worried?

Android ransomware 'Koler' turns into a worm, spreads via SMS

The Koler ransomware locks the device screen and displays fake messages from police agencies

New technique allows attackers to hide stealthy Android malware in images

The attack could be used to distribute malware through applications that appear harmless, researchers said

healthcare security hp

Medical Device Security Benchmarks Emerging

In recent weeks, the FDA and the Center for Internet Security have released guidance documents on medical device security. While there are no hard and fast recommendations, given the diverse types of devices and environments in which...

Android SMS worm Selfmite returns, more aggressive than ever

A new version of the worm is causing infected devices to send thousands of spam text messages and has spread to 16 countries so far

Four-digit passcodes remain a weak point in iOS 8 data encryption

Longer passwords would be more resistant to brute-force attacks

Almost half of Android devices still have a vulnerable browser installed

The percentage is much higher in some countries and lower in the U.S, security firm Lookout estimates

Mobile device management illustration

MobileIron Brings Mobile Management Into Mainstream IT

MobileIron has announced an integration between its EMM suite and Microsoft SCCM. That's great news for its customers, but it also highlights the major challenges IT departments will need to confront as mobile devices begin...

Is that used iPad actually stolen? Apple creates tool for would-be buyers to check

The tool will help prospective buyers of used iPhones and iPads to determine if the devices were lost or stolen

Malware program targets Hong Kong protesters using Apple devices

The program is related to an Android one that seeks to spy on activists, Lacoon Mobile Security said

fiberlink wipedevice2

Fiberlink Wipes One Smartphone or Tablet Every Three Minutes

A study of 130,000 devices managed by Fiberlink’s MaaS360 showed that 450 mobile devices are wiped every day as part of a corporate security policies. That's about one device every three minutes.

byod security

Is a Remote-Wipe Policy a Crude Approach to BYOD Security?

While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security.

Data protection authorities find privacy lapses in majority of mobile apps

One in three applications request excessive permissions, and privacy information is inadequate in 85 percent of them, a study found

Load More