• Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It...
    90 KB (11,017 words) - 00:11, 18 May 2025
  • Thumbnail for Mobile Security Deployments
    Mobile Security Deployments (MSD) is a small specialized tactical unit within the Diplomatic Security Service (DSS) of the United States Department of...
    12 KB (1,124 words) - 23:20, 4 May 2025
  • Thumbnail for Bitdefender
    cybersecurity products and services, including antivirus software, endpoint security, identity protection and online privacy for consumers and enterprises....
    25 KB (2,126 words) - 10:15, 4 June 2025
  • optimize the functionality and security of a mobile communications network while minimizing cost and downtime. With mobile devices becoming ubiquitous and...
    17 KB (2,028 words) - 10:56, 28 April 2025
  • Thumbnail for Mobile app
    mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications...
    34 KB (3,593 words) - 11:10, 4 March 2025
  • Thumbnail for ESET NOD32
    ESET Mobile Security is the replacement for ESET Mobile Antivirus, which provided anti-malware and antispam functionality. ESET Mobile Security contains...
    21 KB (2,231 words) - 05:29, 18 May 2025
  • Thumbnail for MaaS 360
    desktops, mobile devices and apps, wearables, IoT and purpose built devices and allow protected, low risk access to company resources. IBM Security MaaS360...
    11 KB (1,123 words) - 15:50, 29 January 2025
  • Thumbnail for International Mobile Equipment Identity
    The International Mobile Equipment Identity (IMEI) is a numeric identifier, usually unique, for 3GPP and iDEN mobile phones, as well as some satellite...
    26 KB (2,795 words) - 10:51, 1 June 2025
  • Comodo Mobile Security (CMS) is a mobile application provided free by the Comodo Group that protects Android devices against viruses, worms and scripts...
    7 KB (687 words) - 08:49, 18 February 2025
  • Thumbnail for McAfee
    McAfee (redirect from McAfee Security)
    McAfee Business Protection McAfee Safe Connect VPN McAfee Mobile Security for Android McAfee Mobile Security for iOS McAfee Virus Removal Service McAfee Safe Family...
    71 KB (5,972 words) - 05:13, 16 May 2025
  • Phone hacking (category Mobile security)
    computer security that includes studying various situations exactly how attackers use security exploits to gain some level of access to a mobile device...
    16 KB (1,552 words) - 04:45, 6 May 2025
  • security also concentrates on mobile apps and their security which includes iOS and Android Applications Web Application Security Tools are specialized tools...
    10 KB (1,089 words) - 15:00, 13 May 2025
  • Thumbnail for Mobile computing
    equipment. Mobile security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal...
    25 KB (2,687 words) - 10:20, 28 May 2025
  • Zimperium (category Computer security software companies)
    privately owned mobile security company based in the United States and headquartered in Dallas, Texas. Zimperium provides a mobile security platform purpose-built...
    7 KB (513 words) - 23:31, 19 February 2025
  • Thumbnail for Wireless security camera
    Wireless security cameras are closed-circuit television (CCTV) cameras that transmit a video and audio signal to a wireless receiver through a radio band...
    8 KB (992 words) - 11:06, 13 March 2025
  • Trusted execution environment (category Mobile security)
    against the non-secure apps located in mobile OSes. This additional security may help to satisfy the security needs of service providers in addition to...
    34 KB (3,140 words) - 16:18, 29 May 2025
  • Thumbnail for Diplomatic Security Service
    that among other security activities provides protection to state visits Office of Mobile Security Deployments (MSD), Diplomatic Security Service's tactical...
    68 KB (7,299 words) - 16:38, 31 May 2025
  • Comparison of antivirus software (category Security software comparisons)
    software Comparison of firewalls International Computer Security Association Internet security Comparison of computer viruses Virus Bulletin uses http...
    48 KB (400 words) - 13:40, 16 May 2025
  • Thumbnail for China Mobile
    China Mobile is the trade name of both China Mobile Limited and its ultimate controlling shareholder, China Mobile Communications Group Co., Ltd., a Chinese...
    37 KB (3,062 words) - 13:57, 18 May 2025
  • something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something...
    13 KB (1,647 words) - 09:07, 22 March 2025
  • perhaps best known for its work in the field of mobile security, but its work encompassed the full range of mobile device capabilities. OMTP published recommendations...
    8 KB (830 words) - 17:45, 23 September 2024
  • governments for breaking into individuals' phones. For mobile devices, the National Security Agency (NSA) points out that timely updating of software...
    18 KB (1,951 words) - 11:04, 25 May 2025
  • Simjacker (category Computer security exploits)
    is a cellular software exploit for SIM cards discovered by AdaptiveMobile Security. 29 countries are vulnerable according to ZDNet. The vulnerability...
    7 KB (702 words) - 01:42, 16 April 2025
  • Thumbnail for Check Point
    products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management. Check...
    16 KB (1,461 words) - 04:05, 25 May 2025
  • Samsung Knox (category Mobile security)
    (stylized as SΛMSUNG Knox) is a proprietary security and management framework pre-installed on most Samsung mobile devices. Its primary purpose is to provide...
    20 KB (1,910 words) - 15:40, 22 May 2025
  • IMSI-catcher (category Mobile security)
    well-known security hole is exploited by an IMSI catcher. The IMSI catcher masquerades as a base station and logs the IMSI numbers of all the mobile stations...
    19 KB (2,137 words) - 20:56, 21 May 2025
  • Africa-based fintech provider of mobile-based authentication and app security software protecting online and mobile banking and transactions. In February...
    5 KB (349 words) - 13:13, 9 April 2025
  • Thumbnail for Librem 5
    Librem 5 (category Mobile security)
    "[focus] on security by design and privacy protection by default". Purism claimed that the phone would become "the world's first ever IP-native mobile handset...
    25 KB (2,539 words) - 18:32, 2 December 2024
  • Thumbnail for Kevin Mitnick
    2012). "Interview: World's most famous hacker, Kevin Mitnick, on mobile security & Zimperium". Computerworld. Archived from the original on December...
    39 KB (3,176 words) - 12:00, 20 May 2025
  • Thumbnail for Juice jacking
    Juice jacking (category Mobile security)
    "Mactans" that utilized the USB charging port on Apple mobile devices at the 2013 Blackhat USA security briefings. They utilized inexpensive hardware components...
    16 KB (1,732 words) - 04:38, 26 March 2025