Der Netzstandard 5G ist noch Zukunftsmusik, aber schon heute müssen sich Telkos Gedanken machen über die richtige Geschäftsstrategie.
Quelle: Große Erwartungen an 5G
The next step in the evolution of wireless WAN communications will complete the evolution of cellular from wireline augmentation to wireline replacement, and strategically from mobile-first to mobile-only.
Quelle: What is 5G?
Check Point’s SandBlast Mobile fits in between mobile device managers and security event log analyzers, and actually makes it easier to manage the overall security footprint of your entire mobile device fleet.
Quelle: SandBlast Mobile simplifies mobile security
Common Methods Hackers Are Using To Crack Your Cellular Phone – #mobile #security –
Quelle: Common Methods Hackers Are Using To Crack Your Cellular Phone
Developers need to make sure they are baking security into the application code and protecting how their apps handle data, but as the so-called HospitalGown security issue shows, they also need to know how the back-end servers and data stores are being configured.
Quelle: Mobile app developers: Make sure your back end is covered
TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use
Quelle: How to prevent your mobile app from getting hacked
From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, here are some security- and privacy-centered gadgets you’ll want to keep handy
Quelle: 9 essential tools for the security-conscious mobile worker
IT pros from the education industry share their must-have tools for data security, mobile device management and network monitoring.
Quelle: Mobile, security tools among education tech favorites