MOBILE SECURITY KNOWLEDGE BASE
Modern mobile applications run on mobile devices that have the functionality of a desktop or laptop running a general purpose operating system. In this respect many of the risks are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the mobile application and mobile security risks different from the top traditional computing risks.
BYOD Security BYOD is short for “Bring Your Own Device,” a term that refers to the practice of allowing employees to bring their own mobile devices to work for use with company systems, software, networks, or information. Learn More
Android Hacking Since its inception in September 2008, the Android Platform has been a favorite of hackers worldwide. The open source platform and the variety of hardware options makes Android a hacker’s dream. Learn More
Android Security Learn about safeguarding Android apps and the proper steps to keep your Android mobile device secure.Learn More
iOS Security CA Veracode's complete guide to iOS security for users. Learn best practices and tips to protect your Apple iPhone and iPad from security breaches.Learn More