Thursday , April 25 2019
Home / IT Security / Mobile (page 2)

Mobile

Mobile Security Models and Architectures

Mobile Security Models and Architectures

Mobile OS Models and Architecture: The rapid adoption of the mobile device in the workplace has had two obvious consequences: an increase in productivity and capability as well as a corresponding rise in the number of security risks. The designers of devices have frequently made a tradeoff between security and …

Read More »

Top 10 Mobile Devices Security

Top 10 Mobile Devices Security

Mobile Device Security: Mobile device, such as laptops, tablet computers, and Smartphones, provide security challenges above those of desktops workstations, servers, and such in that they leave the office and this increases the odds of their theft. In 2010, AvMed Health Plans, a Florida-based company, had two laptops computer stolen. …

Read More »

SpyNote Android Trojan Builder Leaked

SpyNote is a Android (APK) which basically which facilitates remote spying. The builder, which creates new versions of the malware, recently leaked on several malware discussion forums. SpyNote is similar to OmniRat and DroidJack, which are RATs (remote administration tools) that allow malware owners to gain remote administrative control of …

Read More »