Mobile malware

Results: 423



#Item
101Using the SIM as a Trusted Element to Secure the Mobile Web Henry Irish, Trinity Hall Computer Science Tripos Part III 13 June 2013

Using the SIM as a Trusted Element to Secure the Mobile Web Henry Irish, Trinity Hall Computer Science Tripos Part III 13 June 2013

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-10-23 12:24:28
102Tablet_Security_For_Android_Tablets_Feature_Datasheet

Tablet_Security_For_Android_Tablets_Feature_Datasheet

Add to Reading List

Source URL: bitcast-b.bitgravity.com

Language: English - Date: 2014-11-05 05:52:24
103Mobile Threats & the Underground Marketplace

Mobile Threats & the Underground Marketplace

Add to Reading List

Source URL: docs.apwg.org

Language: English - Date: 2013-04-24 11:32:04
104Quick Heal Mobile Security  User Guide  Quick Heal Technologies (P) Ltd.  http://www.quickheal.com  

Quick Heal Mobile Security  User Guide  Quick Heal Technologies (P) Ltd.  http://www.quickheal.com  

Add to Reading List

Source URL: bitcast-b.bitgravity.com

Language: English - Date: 2014-09-29 01:00:32
105Total_Security_For_Android_Feature_Datasheet

Total_Security_For_Android_Feature_Datasheet

Add to Reading List

Source URL: bitcast-b.bitgravity.com

Language: English - Date: 2014-11-05 05:52:12
106WHITE PAPER  Protecting Mobile Devices from Malware Attack  ON

WHITE PAPER Protecting Mobile Devices from Malware Attack ON

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-27 13:11:19
107Wi-Fi / Bring your own device / Malware / Electronics / Mobile business intelligence / Mobile application management / Technology / Smartphones / Mobile technology

From the Desk of [Insert Name Here] By 2017, the number of smartphone users in the U.S. is expected to surpass 200 million, nearly 65 percent of the population. Negotiating security in the face of an ever-growing imple

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-04-08 08:27:36
108Enabling Users to Self-Manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks Zheng Dong School of Informatics and Computing, Indiana University, Bloomington, IN, USA  Abstr

Enabling Users to Self-Manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks Zheng Dong School of Informatics and Computing, Indiana University, Bloomington, IN, USA Abstr

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-12 01:47:18
109Wi-Fi / Bring your own device / Malware / Electronics / Mobile business intelligence / Mobile application management / Technology / Smartphones / Mobile technology

From the Desk of [Insert Name Here] By 2017, the number of smartphone users in the U.S. is expected to surpass 200 million, nearly 65 percent of the population. Negotiating security in the face of an ever-growing imple

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-04-07 16:40:10
110April 2015 Volume 10, Issue 4 Security in the Mobile Era Center for Internet Security Monthly Security Tips

April 2015 Volume 10, Issue 4 Security in the Mobile Era Center for Internet Security Monthly Security Tips

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-04-08 08:20:03