The Wayback Machine - https://web.archive.org/web/20140810203004/https://blogs.comodo.com/category/mobile-security/
android briefcase

Google Shifts Focus of Android to the Enterprise

Google has signaled a shift in focus for its Android operating system toward’s the enterprise market with its new Android Work component, a feature of its upcoming mobile OS that provides mobile device management (MDM) features and IT controls to Android. This is in re...

at&t device

AT&T Notifies Wireless Customers of Data Breach

The company whose logo used to be the cracked Liberty Bell has some crack’s in its own data security policies. AT&T sent out letters this week to its wireless customers this week informing them that an unspecified number of customers have had the personal information bre...

mdm-main - Copy

Comodo Enhances its Mobile Device Management Platform

We Bring Superior Mobile Device Management to Your Business Comodo Mobile Device Management (CMDM) provides IT administrators with a rich set of capabilities to secure and manage large-scale deployments of corporate and personal mobile devices – all from a single console. CM...

devil phone

Mobile Phones Under Attack by Ransomware

Many people believe that mobile phones are immune from the type of malware attacks that plague desktop systems. Two separate ransomware attacks in recent weeks demonstrate that such thinking is out of touch with today’s reality. Ransomware is an attack strategy where hackers...

the law - small

Supreme Court to Decide if Seizing a Mobile Phone is Like Seizing a Computer

If a person is arrested for a routine traffic violation and has a personal computer conceal in their car trunk and a smartphone in their pocket, the police have no legal right to search their computer because it is considered protected under the 4th Amendments’ prohibition o...

android world - Copy

Comodo Mobile Security for Android: Competitor Comparisons

Mobile Devices, such as smartphones and tablets, are the hottest portion of the computing market these days. The fastest growing segment of this market is devices that use the Android operating system. This has not gone unnoticed by hackers and fraudsters who seek to exploit...

smartphone!

Security Flaw Reported in Samsung Galaxy Androids

Developers of Replicant, an open source variant of Android, claim to have identified a security flaw in some Samsung Galaxy Android based devices that could allow for remote access to user data. Replicant develop Paul Kocialkowski, blogged last week that a broadband processo...

mobile devices

Understanding PGP in Mobile Phone Security

PGP stands for Pretty Good Privacy which is a software package that is employed to encrypt data especially for files and emails. My idea of writing this article is to make people understand how PGP contributes in the general security as it will help them in making good decis...

COMODO_MOBILE_SMALL

Comodo Mobile Security 2.4: Setting the Standard for Mobile Security

Mobile device security, long neglected by device makers, Internet software makers and end users, is increasingly becoming a high priority. Mobile is the direction of computing these days, and hackers are approaching the popular mobile platforms as targets of opportunity. Com...

gold shield

Project Shield: Google Plays Superhero, Selectively

A breakout hit TV series is this years is “Agent’s of S.H.I.E.L.D.” about a government organization that protects society against villains with super powers. In the real word, Google has its own Project Shield that will protect web sites from villains who execute Directed De...

Page 1 of 3123