Mobile devices are great for productivity, but they have completely changed the vulnerability state of our networks. Learn what we have to fear and what measures we can take to solve the mobile edge security problem in this download.
Also check out these other downloads on mobile edge security:
We've seen blended Trojan and virus threats that can spread through smartphones using multiple wireless protocols. Now analyze the first malware that simultaneously infects both PCs and Windows Mobile handheld devices.
By making DRM technology socially acceptable, the iPod has paved the way for the integration and acceptance of the Trusted Computing Group's architecture, which will allow completely new uses and applications of computer security
Whenever a Pocket PC owner uses a public hotspot to check e-mail or surf the Internet, he or she is vulnerable to sniffer-based attacks. Review this step-by-step guide to securely communicating with almost any online service.