Search Results

Hacking Team Remote Control System: Spy Software “Galileo” can hack any mobile devices Hackers from Italy said that they could hack any smartphone. There is a tool in the software market, that can spy the owners of devices running iOS, Android, Windows Phone, BlackBerry, as well as Mac and PC. Italian hackers from Hacking Team […]

F-Secure Mobile Security is a premium security suite for your smartphone or tablet. F-Secure Mobile Security provides complete security for smartphones and tablets Android from malicious applications and Internet threats: malicious and unwanted websites. The solution also guarantees the integrity of sensitive data in case of loss or theft of the device. The Parental Control […]

Mobile viruses are rapidly evolving, and in the first half of 2013, their number an increase of 180 percent 180%. According to experts of the German anti-virus company G Data, for the first 6 months of this year, it was discovered more than 519 thousand new malicious programs for the Android, while in the second […]

Every day, numbers users of mobile platforms is increasing. Most recently, Google celebrated the activation of the 500 millionth device platform Android, Apple by the numbers a little bit behind – 365 million devices. But you must agree that the numbers and dynamics of development is impressive. Smartphones and tablets are increasingly part of our […]

According to Kaspersky Lab’s analysis report, in 2013, the number of malware for Android has reached its absolute peak. In late January 2014 in the Google Play experts found 200 thousand unique samples of malicious software for mobile platforms. For the Android platform, there are over 10 million malicious applications, noted Kaspersky Lab experts, in […]

Of special interest this half year: the increasing use of exploit-based attacks targeted against the Java development platform. Four of five most frequently exploited vulnerabilities are present in Java. Java was the most targeted development platform for exploit attacks during the first half of the year. Finnish antivirus developer F-Secure has published a report on […]

In 2012, the Android platform is five times ahead of Windows on the number of created malicious software for it – this is one of the key findings of new studies prepared by analysts Trend Micro Marlow, United Kingdom, January 28, 2013. According to reports from Trend Micro, dedicated to the study of trends and […]

Explorers of the site BBC, referring to the Chinese news agency Xinhua, reported the discovery of the largest to date mobile botnet, which includes more than a million smart phones belonging to the Chinese people. Used for the rapid spread of ‘Trojan’ application that unnoticed for smartphones and tablets during the installation of new programs. […]

Among the key risks – sophisticated targeted attacks on mobile devices and applications, active use of malicious IPv6 shelters and exploits. 1. The purpose of APT attacks will be mobile users APT attacks, the so-called sophisticated targeted threats (Advanced Persistent Threats), named No. 1 threat because of their ability to use a variety of techniques […]

Network security iOS

Posted: December 1, 2012 in Articles
Tags: , ,

In addition to the basic functions of protection and security features and data encryption, iOS devices provide a wide range of network security features to securely transmit data over the network to both individual and corporate users. For corporate users, it is important that they can access corporate data from anywhere in the world. No […]