Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It...
90 KB (11,017 words) - 00:11, 18 May 2025
Mobile Security Deployments (MSD) is a small specialized tactical unit within the Diplomatic Security Service (DSS) of the United States Department of...
12 KB (1,124 words) - 23:20, 4 May 2025
Bitdefender (redirect from Bitdefender Mobile Security)
cybersecurity products and services, including antivirus software, endpoint security, identity protection and online privacy for consumers and enterprises....
25 KB (2,126 words) - 10:15, 4 June 2025
optimize the functionality and security of a mobile communications network while minimizing cost and downtime. With mobile devices becoming ubiquitous and...
17 KB (2,028 words) - 10:56, 28 April 2025
mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications...
34 KB (3,593 words) - 11:10, 4 March 2025
ESET NOD32 (redirect from ESET Mobile Antivirus)
ESET Mobile Security is the replacement for ESET Mobile Antivirus, which provided anti-malware and antispam functionality. ESET Mobile Security contains...
21 KB (2,231 words) - 05:29, 18 May 2025
MaaS 360 (section Endpoint and mobile security)
desktops, mobile devices and apps, wearables, IoT and purpose built devices and allow protected, low risk access to company resources. IBM Security MaaS360...
11 KB (1,123 words) - 15:50, 29 January 2025
The International Mobile Equipment Identity (IMEI) is a numeric identifier, usually unique, for 3GPP and iDEN mobile phones, as well as some satellite...
26 KB (2,795 words) - 10:51, 1 June 2025
Comodo Mobile Security (CMS) is a mobile application provided free by the Comodo Group that protects Android devices against viruses, worms and scripts...
7 KB (687 words) - 08:49, 18 February 2025
McAfee (redirect from McAfee Security)
McAfee Business Protection McAfee Safe Connect VPN McAfee Mobile Security for Android McAfee Mobile Security for iOS McAfee Virus Removal Service McAfee Safe Family...
71 KB (5,972 words) - 05:13, 16 May 2025
Phone hacking (category Mobile security)
computer security that includes studying various situations exactly how attackers use security exploits to gain some level of access to a mobile device...
16 KB (1,552 words) - 04:45, 6 May 2025
security also concentrates on mobile apps and their security which includes iOS and Android Applications Web Application Security Tools are specialized tools...
10 KB (1,089 words) - 15:00, 13 May 2025
equipment. Mobile security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal...
25 KB (2,687 words) - 10:20, 28 May 2025
Zimperium (category Computer security software companies)
privately owned mobile security company based in the United States and headquartered in Dallas, Texas. Zimperium provides a mobile security platform purpose-built...
7 KB (513 words) - 23:31, 19 February 2025
Wireless security cameras are closed-circuit television (CCTV) cameras that transmit a video and audio signal to a wireless receiver through a radio band...
8 KB (992 words) - 11:06, 13 March 2025
Trusted execution environment (category Mobile security)
against the non-secure apps located in mobile OSes. This additional security may help to satisfy the security needs of service providers in addition to...
34 KB (3,140 words) - 16:18, 29 May 2025
that among other security activities provides protection to state visits Office of Mobile Security Deployments (MSD), Diplomatic Security Service's tactical...
68 KB (7,299 words) - 16:38, 31 May 2025
Comparison of antivirus software (category Security software comparisons)
software Comparison of firewalls International Computer Security Association Internet security Comparison of computer viruses Virus Bulletin uses http...
48 KB (400 words) - 13:40, 16 May 2025
China Mobile is the trade name of both China Mobile Limited and its ultimate controlling shareholder, China Mobile Communications Group Co., Ltd., a Chinese...
37 KB (3,062 words) - 13:57, 18 May 2025
something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something...
13 KB (1,647 words) - 09:07, 22 March 2025
perhaps best known for its work in the field of mobile security, but its work encompassed the full range of mobile device capabilities. OMTP published recommendations...
8 KB (830 words) - 17:45, 23 September 2024
governments for breaking into individuals' phones. For mobile devices, the National Security Agency (NSA) points out that timely updating of software...
18 KB (1,951 words) - 11:04, 25 May 2025
Simjacker (category Computer security exploits)
is a cellular software exploit for SIM cards discovered by AdaptiveMobile Security. 29 countries are vulnerable according to ZDNet. The vulnerability...
7 KB (702 words) - 01:42, 16 April 2025
Check Point (redirect from Multi-domain security management)
products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management. Check...
16 KB (1,461 words) - 04:05, 25 May 2025
Samsung Knox (category Mobile security)
(stylized as SΛMSUNG Knox) is a proprietary security and management framework pre-installed on most Samsung mobile devices. Its primary purpose is to provide...
20 KB (1,910 words) - 15:40, 22 May 2025
IMSI-catcher (category Mobile security)
well-known security hole is exploited by an IMSI catcher. The IMSI catcher masquerades as a base station and logs the IMSI numbers of all the mobile stations...
19 KB (2,137 words) - 20:56, 21 May 2025
Africa-based fintech provider of mobile-based authentication and app security software protecting online and mobile banking and transactions. In February...
5 KB (349 words) - 13:13, 9 April 2025
Librem 5 (category Mobile security)
"[focus] on security by design and privacy protection by default". Purism claimed that the phone would become "the world's first ever IP-native mobile handset...
25 KB (2,539 words) - 18:32, 2 December 2024
Kevin Mitnick (redirect from Mitnick Security Consulting)
2012). "Interview: World's most famous hacker, Kevin Mitnick, on mobile security & Zimperium". Computerworld. Archived from the original on December...
39 KB (3,176 words) - 12:00, 20 May 2025
Juice jacking (category Mobile security)
"Mactans" that utilized the USB charging port on Apple mobile devices at the 2013 Blackhat USA security briefings. They utilized inexpensive hardware components...
16 KB (1,732 words) - 04:38, 26 March 2025