Mobile malware attacks and other exploits are no longer just theoretical occurrences discussed by security researchers and vendors keen on cashing in on a projected market. The threats to mobile devices are real—and reach far beyond simple viruses to include malware, loss and theft, data communication interception, exploitation and misconduct, and direct attacks.
This report, published by the Juniper Networks Mobile Threat Center (GTC), details specific attack vectors on mobile devices over the past year, defines new and emerging mobile threats expected in2012, and gives mobile users practical advice to protect themselves from malicious attacks.
Sign up to receive the Enterprise Management 360˚ ‘Weekly Digest’ direct to your inbox every Thursday. This contains news on the latest industry trends, interviews with key thinkers, white papers and videos. Unsubscribe at any time