Transforming Risky Mobile Apps into Self Defending Apps
Android Vulnerability: Fake ID
Mobile Security Trends in the Workplace
Infographic: Mobile At Work
Migrating from Android to iOS or iOS to Android
Transforming any apps into self-defending apps
The Wild West of Mobile Security – What to look for in 2015
Cheap Android Tablets Riddled with Security Flaws in 2015
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices