Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Comodo Mobile Security (view), Mobile Security Deployments (view)

searching for Mobile security 163 found (261 total)

alternate case: mobile security

Wireless security camera (992 words) [view diff] no match in snippet view article find links to article

Wireless security cameras are closed-circuit television (CCTV) cameras that transmit a video and audio signal to a wireless receiver through a radio band
Samsung Galaxy A72 (634 words) [view diff] case mismatch in snippet view article find links to article
A52 star in unboxing and promo videos". gsmarena.com. "Samsung Mobile Security". Samsung Mobile Security. Samsung Electronics. Retrieved 22 June 2021.
Armor Holdings (660 words) [view diff] case mismatch in snippet view article find links to article
Mobile Security Division were merged into BAE Systems as Mobility & Protection Systems, BAE Systems Products Group, and BAE Systems Mobile Security respectively
Special Missions Training Center (1,210 words) [view diff] case mismatch in snippet view article find links to article
the U.S. Navy established a training detachment within SMTC to train Mobile Security Force (MSF) personnel as Tactical Coxswains and Crewmen, and in 2004
La Alcaidesa (744 words) [view diff] exact match in snippet view article find links to article
Algeciras and Marbella. The town has two staffed, gated access points and mobile security patrols. A fire station exclusively serving Alcaidesa was built in
Good Technology (1,978 words) [view diff] exact match in snippet view article find links to article
Good Technology, owned by BlackBerry Limited, is a mobile security provider headquartered in Sunnyvale, California, United States. The company serves
Centigon (company) (980 words) [view diff] exact match in snippet view article
security products and services which in late 2005 reorganized its mobile security division under the Centigon brand name. Centigon was founded in 1998
Enlisted Expeditionary Warfare Specialist (330 words) [view diff] case mismatch in snippet view article find links to article
was Petty Officer 2nd Class (EXW/SW) Carl P. Hurtt, Jr, assigned to Mobile Security Squadron Seven (MSS-7). Navy Expeditionary Combat Command (NECC) units
ZDNET (2,360 words) [view diff] no match in snippet view article find links to article
its blog network covers—now "Companies," "Hardware," "Software," "Mobile," "Security" and "Research"—and de-emphasize the downloads and reviews it imported
Naval Coastal Warfare (United States) (224 words) [view diff] case mismatch in snippet view article
Maritime Expeditionary Security Force (MESF), formerly known as the Mobile Security Forces (MSF), has the primary mission of force protection conducted
Craig Sawyer (615 words) [view diff] case mismatch in snippet view article find links to article
parachuting; and hand-to-hand combat, among others. On High-Threat Mobile Security operations for the U.S. Department of State in Iraq in 2004–2005, Sawyer
ChatSecure (478 words) [view diff] case mismatch in snippet view article find links to article
Freitas (24 October 2013). "ChatSecure v12 Provides Comprehensive Mobile Security and a Whole New Look". GuardianProject.info. Archived from the original
Integrated Risk Management Services (1,243 words) [view diff] case mismatch in snippet view article find links to article
Integrated Risk Management Services (I-RMS) is the trading name of Business Mobile Security Services Ltd, a private security company based in Naas, Ireland. It
Xafecopy Trojan (627 words) [view diff] no match in snippet view article find links to article
"xafecopy-trojan-in-india-which-steals-money-through-mobile-phones-mobile-security". Retrieved 10 September 2017. "В России обнаружена эпидемия четырех
Security Police (Japan) (1,144 words) [view diff] case mismatch in snippet view article
Clerk Section 1[1] Mobile Security Squad Section 2[2] Mobile Security Squad Section 3[3] Mobile Security Squad Section 4[4] Mobile Security Squad Section 1
IronKey (809 words) [view diff] case mismatch in snippet view article find links to article
"Marble Cloud Launches Mobile Security Service for iPhone, Android". eWeek. Retrieved Oct 16, 2012. "Imation to Unify Mobile Security Portfolio around IronKey
MaaS 360 (1,123 words) [view diff] case mismatch in snippet view article find links to article
Vijay (27 January 2023). "IBM to Acquire Fiberlink: What It Means for Mobile Security". Security Intelligence. Retrieved 27 January 2023. DiStefano, Joseph
GadgetTrak (1,310 words) [view diff] exact match in snippet view article find links to article
GadgetTrak Mobile Security app for Blackberry and Windows mobile devices. iOS – On November 4, 2008, the company launched its first mobile security software
Chicago Transit Authority (3,176 words) [view diff] case mismatch in snippet view article find links to article
CTA and CPD Officials Test Mobile Security Network" (Press release). CTA. December 2, 2006. "CTA to Test Mobile Security Network to Enhance Safety on
Jon Callas (1,409 words) [view diff] exact match in snippet view article find links to article
considered "one of the most respected and well-known names in the mobile security industry." Callas is credited with creating several Internet Engineering
Simjacker (696 words) [view diff] case mismatch in snippet view article find links to article
"GSMA Mobile Security Research Acknowledgements". Security. Retrieved 2021-07-28. "Simjacker – Next Generation Spying Over Mobile | Mobile Security News
Kevin Mitnick (3,023 words) [view diff] exact match in snippet view article find links to article
2012). "Interview: World's most famous hacker, Kevin Mitnick, on mobile security & Zimperium". Computerworld. Archived from the original on December
IPod Touch (1st generation) (474 words) [view diff] no match in snippet view article
Rouse; Joel Scambray; Mike Price (July 30, 2013). Hacking Exposed Mobile: Security Secrets & Solutions. McGraw Hill Education. p. 49. ISBN 9780071817011
Giesecke+Devrient (1,678 words) [view diff] case mismatch in snippet view article find links to article
with payment cards, SIM card and eSIM and security solutions into G+D Mobile Security GmbH (G+D MS). In 2018, Build38 was created as a spin-off and took
Akamai Technologies (4,529 words) [view diff] exact match in snippet view article find links to article
combining the Akamai Security and Personalization Services (SPS) mobile security suite and real-time threat intelligence with Plume's Consumer Experience
Fandango Media (2,421 words) [view diff] case mismatch in snippet view article find links to article
Cynthia J.; Romero, Jake (March 4, 2014). "Stop Phoning It in on Mobile Security: What Your Business Needs to Know About the Federal Trade Commission's
Helmut Gröttrup (2,900 words) [view diff] case mismatch in snippet view article find links to article
presented the first smart card which later became the basic product of G+D Mobile Security. Gröttrup retired in 1980. Helmut Gröttrup explaining the basic principles
Entersekt (372 words) [view diff] case mismatch in snippet view article find links to article
Private Equity Investments. In 2017 April, Entersekt won the Best Mobile Security Technology Award at the 2017 Banker Africa Southern Africa Banking
Dark Caracal (457 words) [view diff] exact match in snippet view article find links to article
campaign was discovered by the Electronic Frontier Foundation and the mobile security firm Lookout, who published their findings on January 18, 2018. The
GlobalSign (1,332 words) [view diff] exact match in snippet view article find links to article
2022-12-15. Murphy, Ian (2019-02-27). "GlobalSign joins Microsoft ISA for mobile security". Enterprise Times. Retrieved 2022-12-15. Jacob, Marc (2022-12-15)
Norton Security (494 words) [view diff] case mismatch in snippet view article find links to article
not the latest product updates. Android Operating Systems (Norton Mobile Security for Android was replaced by Norton360 Antivirus & Security) iOS Operating
IBM Cloud (1,544 words) [view diff] no match in snippet view article find links to article
suite of over 100 cloud-based development tools "including social, mobile, security, analytics, database, and IoT (internet of things). Bluemix had grown
CIPURSE (1,557 words) [view diff] case mismatch in snippet view article find links to article
Center Enotria ETDA Etertin Corp Facillite FEIG Electronic FIME G+D Mobile Security Gemalto GTech Technologia E Software (Gbits) GuardTek HID Global IDEMIA
Telephone numbers in Gabon (153 words) [view diff] exact match in snippet view article find links to article
19BP Enquiries 12 Electronic directory 11 International enquiries 16 Mobile security 1718 Police 1730 Fire service 18 Police station 1710 Medical emergencies
HSC-5 (1,578 words) [view diff] case mismatch in snippet view article find links to article
Marine Corps Fleet Anti-Terrorism Security Team (FAST) companies and Mobile Security Squadron Seven (MSS-7), as well as with forces from various allied
Sanjay Swamy (375 words) [view diff] exact match in snippet view article find links to article
Government of India's UIDAI. He was the CEO of mobile company mChek, a mobile security and payments solutions company.[citation needed] Sanjay Swamy was born
Danielle Lloyd (1,447 words) [view diff] exact match in snippet view article find links to article
Retrieved 9 October 2008. Gary Fennelly (24 July 2007). "Pin-up Dani backs mobile security campaign". Belfast Telegraph. Archived from the original on 1 August
Dimension Data (1,781 words) [view diff] exact match in snippet view article find links to article
variety of other cybersecurity services. It also offers services for mobile security and data leakage prevention. Dimension Data offers platform-based managed
Zenprise (659 words) [view diff] case mismatch in snippet view article find links to article
developed and launched a free application on Splunkbase. Called Zenprise Mobile Security Intelligence, the application integrates with Zenprise mobile device
Samsung India Software Centre (352 words) [view diff] case mismatch in snippet view article find links to article
academic institutes like IITs for research & innovation in domains of AI, Mobile Security, Healthcare, and Audio Processing. The center also has academic tie-up
Bureau of Diplomatic Security bibliography (538 words) [view diff] case mismatch in snippet view article find links to article
Diplomatic Security WASHINGTON POST article Diplomatic Security - Mobile Security Deployments (MSD) 1996 Secretary of State Warren Christopher presents
Jimmy Mann (footballer) (247 words) [view diff] exact match in snippet view article
retiring from football Jimmy Mann returned to hometown Goole as a mobile security officer for Securicor, then as a Co-op milkman and from 1994 a marine
Holly Quin-Ankrah (592 words) [view diff] case mismatch in snippet view article find links to article
Echo. Retrieved 9 June 2012. Jones, Catherine (10 December 2004). "Mobile Security; Phones protection". Liverpool Echo. Retrieved 9 June 2012. "Eggs-citing
Louis-Gaston Mayila (1,306 words) [view diff] case mismatch in snippet view article find links to article
Decentralization and Mobile Security. He was subsequently promoted to the post of Minister of the Interior, Decentralization, and Mobile Security in early 1995
WOT Services (1,229 words) [view diff] case mismatch in snippet view article find links to article
browsing tool for other browsers, including Chrome and Opera. The WOT "Mobile Security & Protection" mobile app was removed from Google Play, approximately
RSA Conference (1,494 words) [view diff] exact match in snippet view article find links to article
University of Minnesota Greene, Tim (February 3, 2011). "From cloud and mobile security to encryption, security concerns abound as RSA turns 20". Network World
Delhi Police (2,852 words) [view diff] exact match in snippet view article find links to article
evacuation of Protected Persons, and providing static as well as mobile security to the Protected Persons". : para 2.129  In addition to the Ministry
KNOX (106 words) [view diff] exact match in snippet view article find links to article
traditional incense firm in Saxony, Germany Samsung KNOX, an enterprise mobile security solution Knox (disambiguation) This disambiguation page lists articles
Microsoft Intune (856 words) [view diff] case mismatch in snippet view article find links to article
Microsoft Intune". Cloudinfra.net. Retrieved 18 November 2023. "Enterprise Mobile Security – Microsoft 365". www.microsoft.com. Retrieved 2019-04-10. "Office
Juniper Networks (6,907 words) [view diff] case mismatch in snippet view article find links to article
2011, Juniper and AT&T announced they would jointly develop the AT&T Mobile Security application based on Juniper's Pulse security software. In May 2012
Citrix Endpoint Management (345 words) [view diff] case mismatch in snippet view article find links to article
16 July 2015. Nicole Perlroth (5 December 2015). "Citrix Acquires Mobile Security Start-Up Zenprise". The New York Times. Retrieved 16 July 2015. "Citrix
IdeaPad tablets (1,977 words) [view diff] case mismatch in snippet view article find links to article
for Speed: Shift, Kindle for Android, Documents To Go, and Norton Mobile Security. In its review, Gizmodo appreciated the value that the IdeaPad K1 represented
Whisper (disambiguation) (604 words) [view diff] exact match in snippet view article
South African two-seat kit motoglider Whisper Systems, an enterprise mobile security company acquired by Twitter in 2011 Whisper X350 Generation II, a South
Google Tensor (2,699 words) [view diff] exact match in snippet view article find links to article
Stephan (October 27, 2021). "Pixel 6: Setting a new standard for mobile security". Google Online Security Blog. Archived from the original on October
Moxie Marlinspike (2,072 words) [view diff] exact match in snippet view article find links to article
technology officer and co-founder of Whisper Systems, an enterprise mobile security startup company. In May 2010, Whisper Systems launched TextSecure and
Parental controls (2,490 words) [view diff] case mismatch in snippet view article find links to article
Application?". 15 August 2016. "Trend Micro Announces the Next Generation Mobile Security Solution for the Android Platform." Benzinga.com 15 Sept. 2011. Business
EyeVerify (1,411 words) [view diff] exact match in snippet view article find links to article
participant in the Wells Fargo Startup Accelerator for innovators in mobile security. In April 2016, Tangerine Bank became the first Canadian financial
Allot (company) (1,274 words) [view diff] exact match in snippet view article
cybersecurity for the connected home. In February, Allot was awarded "best mobile security solution" in the 2018 Cybersecurity Excellence Awards. In July, the
South Park, San Francisco (1,739 words) [view diff] case mismatch in snippet view article find links to article
collaborative learning platform Hummer Winblad, Venture Capital firm Lookout Mobile Security LookSmart, online advertising Lumosity, Brain fitness Mashape, Cloud
IOS app approvals (3,287 words) [view diff] case mismatch in snippet view article find links to article
pp. 160 "How Apple is improving mobile app security". "How does iOS Mobile Security work and why do I need it?". 4 August 2014. ""Jekyll" test attack sneaks
Verimatrix (1,147 words) [view diff] case mismatch in snippet view article find links to article
2023-11-08. May 8, Tom Field. "Defending Against Emerging Threats in Mobile Security". www.databreachtoday.com.{{cite web}}: CS1 maint: numeric names: authors
Jeff Jordan (venture capitalist) (835 words) [view diff] case mismatch in snippet view article
Raises $44 Million From Andreessen Horowitz". Techcrunch. "Lookout Mobile Security Secures $40 Million Investment Led by Andreessen Horowitz". News Room
Unit 8200 (2,956 words) [view diff] case mismatch in snippet view article find links to article
Ventures Imperva Indeni Infinidat Infinipoint IntSights IVIX Lacoon Mobile Security Leadspace LEVL Technologies noname Security Namogoo NICE NSO Group
Internet in Mexico (1,605 words) [view diff] case mismatch in snippet view article find links to article
Freedom on the Net 2011, Freedom House, January 18, 2012 "Digital and Mobile Security for Mexican Journalists and Bloggers". Freedom House. Retrieved 2015-02-22
BlackBerry Limited (13,784 words) [view diff] exact match in snippet view article find links to article
announced the release of BlackBerry Secure. Billed as a "comprehensive mobile security platform for the Enterprise of Things", BlackBerry Secure deepened
IBM (11,618 words) [view diff] no match in snippet view article find links to article
towards growing the company's "strategic imperatives" (cloud, analytics, mobile, security, social) in 2015. IBM has been a leading proponent of the Open Source
Sheryl WuDunn (1,103 words) [view diff] exact match in snippet view article find links to article
start-up companies in a variety of fields, including healthcare and mobile security. Nicholas D. Kristof; Sheryl WuDunn (12 October 2011). China Wakes:
LA Cyber Lab (606 words) [view diff] exact match in snippet view article find links to article
City Cyber Command is a city government agency. Zimperium enterprise mobile security apps are sponsored by State of Michigan, NYC Cyber Command and Los
Pine Mountain Lake, California (1,226 words) [view diff] exact match in snippet view article find links to article
course with a full-time golf pro, a "country club," and full-time mobile security patrol. The lake is about 2,546 feet (776 m) feet above mean sea level
USNS Stalwart (722 words) [view diff] exact match in snippet view article find links to article
to an operational training vessel, or to use the vessel solely as a mobile security asset were not practical for the college, despite some efforts in procuring
International Mobile Equipment Identity (2,638 words) [view diff] exact match in snippet view article find links to article
from the original on 19 July 2019. Retrieved 12 August 2019. "FAQs on mobile security". AMTA.org.au. Archived from the original on 2013-05-22. Retrieved
BMW 5 Series (E60) (2,819 words) [view diff] case mismatch in snippet view article
autoblog.com. Autoblog. Retrieved 4 September 2005. "BMW Engineered Mobile Security. Armoured Vehicle Solutions". www.press.bmwgroup.com. BMW Group. Retrieved
Heartbleed (9,736 words) [view diff] case mismatch in snippet view article find links to article
Heartbleed scanner module Heartbleed Server Scanner by Rehmann Lookout Mobile Security Heartbleed Detector, an app for Android devices that determines the
Para-Commando Brigade (1,125 words) [view diff] exact match in snippet view article find links to article
Commando and 3rd Parachute Battalions were deployed to man static and mobile security posts around government buildings in Brussels, amidst a then-ongoing
DSTC (87 words) [view diff] case mismatch in snippet view article find links to article
Diplomatic Security Training Center, a training center for the U.S. Mobile Security Deployment Duluth State Teachers College, previous name of University
In-Q-Tel (2,331 words) [view diff] case mismatch in snippet view article find links to article
2021-05-25. "Tyfone and In-Q-Tel Sign Strategic Agreement to Bring Mobile Security in Cloud and NFC Transactions for U.S. Government – In-Q-Tel". www
John Marshall (entrepreneur) (1,287 words) [view diff] case mismatch in snippet view article
Global Mobile Awards, three 2013 MobITS Awards from CTIA and the Best Mobile Security Solution from SC Magazine. Marshall is a board member on the Georgia
A5/1 (2,676 words) [view diff] exact match in snippet view article find links to article
Cellphone Crypto - Slashdot "Sources: We were pressured to weaken the mobile security in the 80's". 9 January 2014. Biryukov, Alex; Adi Shamir; David Wagner
AV-Comparatives (532 words) [view diff] case mismatch in snippet view article find links to article
Security Reviews / Tests Malware Protection Test Malware Removal Test Mobile Security Review Parental Control Test Performance Test PowerShell-based File-less
LiveView Technologies (561 words) [view diff] case mismatch in snippet view article find links to article
by Ryan Porter and Bob Brenner in 2005. The company creates the D3 Mobile Security Unit, a solar-powered surveillance trailer with cameras on a 22-foot
Carrier Strike Group Nine 2004–09 operations (5,305 words) [view diff] case mismatch in snippet view article find links to article
group's 2007 pre-deployment Composite Unit Training Exercise included Mobile Security Squadron 2, and Helicopter Visit, Board, Search and Seizure (HVBSS)
Nokia E6 (2,531 words) [view diff] case mismatch in snippet view article find links to article
JoikuSpot Premium (mobile WiFi hotspot), World Traveler, F-secure Mobile Security and QuickOffice. The stock OS version Symbian Anna was specially adapted
Pixel 6 (5,976 words) [view diff] exact match in snippet view article find links to article
Stephan (October 27, 2021). "Pixel 6: Setting a new standard for mobile security". Google Online Security Blog. Archived from the original on October
Aegis Defence Services (1,040 words) [view diff] exact match in snippet view article find links to article
reconstruction program. These services include: Providing static and mobile security details for the PCO and United States Army Corps of Engineers; Maintaining
Pohang Operation (3,316 words) [view diff] exact match in snippet view article find links to article
approaches inaccessible to armor. Smith, therefore, decided to emphasize mobile security operations and made linear defense a secondary mission.: 353  The enemy
Sierra Ventures (1,185 words) [view diff] exact match in snippet view article find links to article
advertising attribution company, acquired by Google in 2014. AuthenTec – mobile security company, acquired in 2012 by Apple for $365 million. Bina Technologies
G4S (5,288 words) [view diff] exact match in snippet view article find links to article
services' is another core service, where G4S provides key holding, mobile security patrol and response services and alarm receiving and monitoring facilities
Mobile Mail-Screening Station (393 words) [view diff] exact match in snippet view article find links to article
Group, which is formed to secure national security special events. "Mobile security: Mail screening hits the road". usps.com. U.S. Postal Service. Retrieved
Firefox OS (4,940 words) [view diff] exact match in snippet view article find links to article
into Firefox OS, a core feature of the platform. Janne Lindqvist, a mobile security researcher at the Rutgers University WINLAB, expressed concern about
Gary Cohn (2,890 words) [view diff] case mismatch in snippet view article find links to article
Adviser". Bloomberg.com. 2018-10-12. Retrieved 2019-12-24. "About us - Mobile Security". Sotera. Retrieved 2024-03-14. "Gary Cohn Joins MZ Board of Directors"
Hacker Halted (516 words) [view diff] case mismatch in snippet view article find links to article
Governance, Policies & Standards Business Continuity & Disaster Recovery Mobile Security Virtualization Security Secure Programming Malware and Botnets Social
Chris Wysopal (781 words) [view diff] exact match in snippet view article find links to article
using an instrumented sandbox and machine learning classification for mobile security U.S. Patent 8,613,080, Assessment and analysis of software security
Greg Garcia (government official) (271 words) [view diff] case mismatch in snippet view article
February 7, 2017. "Former DHS And Bank Of America Exec Greg Garcia Talks Mobile Security, 21st Century Warfare, Cyber Crime". Washington Executive. J Media
International Women's Media Foundation (1,995 words) [view diff] exact match in snippet view article find links to article
women's organizations. In September 2015, the IWMF released a free mobile security app designed for journalists. The app was received critically by security
USS Cole bombing (5,527 words) [view diff] case mismatch in snippet view article find links to article
from terrorist attack. MARFPCOM aligned four existing components: the Mobile Security Forces, Naval Coastal Warfare, Explosive Ordnance Disposal (EOD), and
Endgame, Inc. (949 words) [view diff] exact match in snippet view article find links to article
data exploits. Endgame acquired Onyxware in 2014, a Florida-based mobile security technology company which provides applications for detecting third-party
Orange S.A. (8,861 words) [view diff] exact match in snippet view article find links to article
10 September 2009. Reuben, Emily (22 November 2006). "Concern over mobile security". Channel 4 News. Archived from the original on 15 October 2007. Retrieved
USS Abraham Lincoln (CVN-72) (7,440 words) [view diff] case mismatch in snippet view article
Group Nine's Composite Unit Training Exercise featured 24 sailors from Mobile Security Squadron 2 (MSRON-2), Helicopter Visit, Board, Search and Seizure Team
Samsung Electronics (17,313 words) [view diff] exact match in snippet view article find links to article
Electronics announced the company had expanded the Samsung Knox enterprise mobile security platform with the introduction of Samsung Knox Guard. It allows companies
Samy Kamkar (2,088 words) [view diff] exact match in snippet view article find links to article
Kamkar traveled to more than a dozen countries speaking about his mobile security research and weaknesses he discovered from his cryptanalysis of the
WatchGuard (861 words) [view diff] case mismatch in snippet view article find links to article
20, 2017. Retrieved July 31, 2018. "2017 Mobility 100: 30 Coolest Mobile Security And Device Management Vendors". crn.com. May 8, 2017. Retrieved August
Iris Capital (845 words) [view diff] exact match in snippet view article find links to article
Kyriba – France/US: treasury solutions in the cloud Lookout – US: mobile security PlaceIQ – US: Location intelligence services Quantifind – US ReBuy
SHSH blob (1,422 words) [view diff] case mismatch in snippet view article find links to article
Katie (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Elsevier. pp. 47–50. ISBN 9781597496599
BlackBerry Priv (3,088 words) [view diff] case mismatch in snippet view article find links to article
Vox Media. 8 October 2015. Retrieved 3 November 2015. "Snapdragon Mobile Security for Embedded Devices, Biometric Authentication and SafeSwitch Technology"
Fountain of Light (658 words) [view diff] exact match in snippet view article find links to article
addition to the services Miller mentions there were also a bookstore, a mobile security patrol, a small research library, and a shortwave radio network connecting
List of mergers and acquisitions by Apple (4,474 words) [view diff] exact match in snippet view article find links to article
Audio  Italy — Logic Pro, GarageBand 41 July 27, 2012 AuthenTec PC and mobile security products  United States 356,000,000 Touch ID 42 September 27, 2012
Mark Edwards (British businessman) (346 words) [view diff] case mismatch in snippet view article
Mformation and F-Secure Partner to Provide Remote Management for F-Secure Mobile Security Solution". Mformation.com. 12 November 2008. Retrieved 26 July 2012
Cloud Security Alliance (1,373 words) [view diff] case mismatch in snippet view article find links to article
Devices". Redmondmag.com. Retrieved 2013-08-22. "The Evil Eight: Top Mobile Security Threats | How-To | Mobile Enterprise(ME)". Mobileenterprise.edgl.com
List of mergers and acquisitions by BlackBerry (925 words) [view diff] exact match in snippet view article find links to article
communications  United States Undisclosed 30 4 August 2015 Good Technology Mobile security provider  United States $425 million 31 19 February 2016 Encription
Smart card (12,137 words) [view diff] case mismatch in snippet view article find links to article
Michael (2013). Giesecke+Devrient (ed.). From Eurocheque Card to Mobile Security 1968–2012. Battenberg Gietl Verlag. ISBN 978-3866465497. Jurgensen
Signal (messaging app) (11,632 words) [view diff] exact match in snippet view article
encrypting other forms of data. All of these were proprietary enterprise mobile security software and were only available for Android. In November 2011, Whisper
KeepVault (423 words) [view diff] exact match in snippet view article find links to article
users", Press Release, 11/05/2006 "AuthenTec Buys Proxure" "Apple buys mobile security firm AuthenTec for $356 million", Reuters "KeepVault Change of Ownership"
LowRISC (572 words) [view diff] case mismatch in snippet view article find links to article
and collaboratively developed by Google, ETH Zurich, Nuvoton, G+D Mobile Security, Seagate, and Western Digital. The OpenTitan source code is available
Substance abuse prevention (3,618 words) [view diff] case mismatch in snippet view article find links to article
US Navy Master-at-Arms 1st Class Michael Turner of Mobile Security Squadron Two (MSS-2) collects information at the Substance Abuse Prevention Summit
Ninetology U9Z1+ (362 words) [view diff] case mismatch in snippet view article find links to article
Maps, News and Weather Application, Voice Recorder, Adobe Reader, NQ Mobile Security, NQ Valut, M Warranty "Get yourself Urbanite, get U9". enterpriseitnews
Necuno (248 words) [view diff] case mismatch in snippet view article find links to article
original on 2019-03-07. Retrieved 2019-03-07. "Necunos - Redefining Mobile Security". Necuno Solutions. Tung, Liam. "First truly open-source smartphone
MobiWire (372 words) [view diff] case mismatch in snippet view article find links to article
MobiWire Unveils Secure Business Phone Portfolio With Embedded Mobile Security https://web.archive.org/web/20110402092224/http://www.droid-den
Infysec (499 words) [view diff] case mismatch in snippet view article find links to article
dead link] DoWebScan website security scanner Capture the Flag Cyber Sec Tabloid, Cyber Security News Hub Andro Sentry, Mobile Security and Antivirus
AnchorFree (1,026 words) [view diff] exact match in snippet view article find links to article
2019-04-16. Velazco, Chris. "AnchorFree brings their Hotspot Shield mobile security app to Android". TechCrunch. Retrieved 8 April 2013. Williams
Regional Security Office (628 words) [view diff] case mismatch in snippet view article find links to article
Diplomatic Security WASHINGTON POST article Diplomatic Security - Mobile Security Deployments (MSD) 1996 Secretary of State Warren Christopher presents
Kcell (1,747 words) [view diff] exact match in snippet view article find links to article
three years. 230 free master classes on such themes as mobile media, mobile security, mobile education, mobile state, mobile business, as well as the course
RISC-V (13,517 words) [view diff] exact match in snippet view article find links to article
Barbello, Brandon (27 October 2021). "Pixel 6: Setting a new standard for mobile security". Google Security Blog. Archived from the original on 27 October 2021
Regional Security Officer (1,036 words) [view diff] case mismatch in snippet view article find links to article
Diplomatic Security WASHINGTON POST article Diplomatic Security - Mobile Security Deployments (MSD) 1996 Secretary of State Warren Christopher presents
Arxan Technologies (1,138 words) [view diff] case mismatch in snippet view article find links to article
Company 2015 Mobile Innovations Award Winner for Best Management of Mobile Security Issues Info Security Products Guide 2014 Winner for Best New Product:
TextSecure (3,426 words) [view diff] exact match in snippet view article find links to article
provided encrypted voice calls. All of these were proprietary enterprise mobile security software. In November 2011, Whisper Systems announced that it had been
Enterproid (416 words) [view diff] exact match in snippet view article find links to article
[citation needed] Enterproid was founded in 2010 by former Morgan Stanley mobile security and IT executives. The founding team includes CEO Andrew Toy, COO Alexander
Antoine Mboumbou Miyakou (605 words) [view diff] case mismatch in snippet view article find links to article
was appointed Minister of the Interior, Local Collectivities, and Mobile Security. He was then moved to the position of Minister of Transport, Merchant
Shomrim (neighborhood watch group) (6,434 words) [view diff] exact match in snippet view article
houses and cars. In 2009 the Flatbush Shomrim acquired a $250,000 mobile security command center which is similar to NYPD command centers, including
NORTHAG wartime structure in 1989 (12,153 words) [view diff] case mismatch in snippet view article find links to article
425 Mobile Security Infantry Company, 't Harde, to secure the transport and field storage of nuclear warheads for 19th Artillery Battalion 434 Mobile Security
Markus Jakobsson (1,225 words) [view diff] exact match in snippet view article find links to article
various forms on online fraud. His later research was focused toward mobile security and the detection of malware on mobile platforms. In a 1999 paper he
David Ferrie (4,364 words) [view diff] case mismatch in snippet view article find links to article
Falcon Cadet Squadron. An offshoot of this group was the Internal Mobile Security Unit, a group formed for the fight against Fidel Castro's Cuba. Over
GSM 03.48 (373 words) [view diff] exact match in snippet view article find links to article
Mobile security protocol
Otto Otepka (702 words) [view diff] case mismatch in snippet view article find links to article
Agents Association Unofficial Diplomatic Security Special Agent Forum Mobile Security Deployments (MSD) Computer Investigations & Forensics Investigative
MarkAny (624 words) [view diff] exact match in snippet view article find links to article
Korea Products Computer security solutions for document security, mobile security, electronic document anti-forgery, CCTV video footage, and multimedia
Military history of Chad (2,424 words) [view diff] exact match in snippet view article find links to article
addition to strengthening the regular army, the government increased mobile security companies of the National Gendarmerie, equipped as light infantry,
Spice Stellar Nhance Mi-435 (398 words) [view diff] case mismatch in snippet view article find links to article
Nhance can be enhanced is secured with a 6-month subscription to NQ Mobile Security. It has an 8 MP camera with flash at rear and 1.3 MP camera at the
Yingying Chen (404 words) [view diff] exact match in snippet view article find links to article
2020 class of fellows, "for contributions to mobile computing and mobile security". She was named as a fellow of the National Academy of Inventors in
List of Russian inventors (2,312 words) [view diff] case mismatch in snippet view article find links to article
Federation Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Mobile Security anti-virus products Adolphe Kégresse (1879–1943)  France  Russian Empire
Remote mobile virtualization (1,351 words) [view diff] exact match in snippet view article find links to article
but for remoting mobile OSes". Retrieved 9 June 2015. "Redefine your mobile security strategy with Virtual Mobile Infrastructure". "Desktop virtualization
Rafael O'Ferrall (1,551 words) [view diff] exact match in snippet view article find links to article
Iraqi Freedom / Operation Noble Eagle. O'Ferrall managed and directed mobile security teams to complete over 242 security missions aboard 173 Military Sealift
BizTech (169 words) [view diff] case mismatch in snippet view article find links to article
in the United States. "Inspirage Chief Security Officer Discusses Mobile Security with BizTech Magazine". inspirage.com., March 6, 2017 "Digital Transformation
Jeremy Burge (3,100 words) [view diff] exact match in snippet view article find links to article
2023. Retrieved 5 August 2023. Cook, James (4 March 2019). "Facebook mobile security loophole lets anyone look up your profile". The Telegraph. ISSN 0307-1235
Blk71 (812 words) [view diff] exact match in snippet view article find links to article
across Asia, Daylight Studios, a mobile game developer and Appknox, a mobile security company. However, there are also a few hardware tech companies, such
Mocana (1,182 words) [view diff] exact match in snippet view article find links to article
replaced Isaacs in April 2016. In April 2016, Mocana spun off its mobile security business to Blue Cedar Networks. William Diotte replaced Graham as
Crypto Wars (4,059 words) [view diff] exact match in snippet view article find links to article
Usenet: 2ts9a0$95r@lyra.csx.cam.ac.uk. "Sources: We were pressured to weaken the mobile security in the 80's". Aftenposten. Stallings, W.: Cryptography and network
List of Israeli companies listed on the Nasdaq (2,066 words) [view diff] case mismatch in snippet view article find links to article
Year Listed Year Delisted Sector Fate Ability Inc ABILF 2016 2018 Mobile Security Now OTC. Accord Networks Ltd. ACCD 2000 2000 Networking & communications
Wendell Brown (2,261 words) [view diff] exact match in snippet view article find links to article
in 2016, and introduced its Direct Autonomous Authentication (DAA) mobile security technology in 2018. Multinational telecommunications provider Telefónica
Critical Start (880 words) [view diff] exact match in snippet view article find links to article
the agreement, Critical Start acquired its native iOS and Android mobile security operations center application. In August 2019, Critical Start published
Open Whisper Systems (4,322 words) [view diff] exact match in snippet view article find links to article
Whisper Systems in 2010. The company produced proprietary enterprise mobile security software. Among these were an encrypted texting program called TextSecure
Remo Sync (580 words) [view diff] exact match in snippet view article find links to article
Data transmission is encrypted with SSL. RemoSync implements all mobile security features available on Microsoft Exchange. RemoSync 3.0 and later versions
Allied Minds (798 words) [view diff] exact match in snippet view article find links to article
Corp. to share intellectual property and technology in the cyber and mobile security field. This partnership was later expanded in July 2016 to provide
Los Angeles Police Department resources (5,051 words) [view diff] case mismatch in snippet view article find links to article
Administrative Platoon, Metropolitan Division RP Security Services Division Mobile Security Patrol S Senior Lead Officer (Two Uniformed Officers) SL Senior Lead
Rafay Baloch (2,276 words) [view diff] case mismatch in snippet view article find links to article
Patch to Same Origin Policy Bypass in Old Android Devices". Zimperium Mobile Security Blog. 2015-01-15. Retrieved 2019-08-19. "Android security shift exposes
Intelligent Energy (2,375 words) [view diff] case mismatch in snippet view article find links to article
Awards: European Business Awards announce 2009 Ruban d'Honneur Winners. Mobile Security Zone. 27 November 2008. Retrieved 19 June 2013. Rushlight Awards 2010
Carrier Strike Group 9 (9,035 words) [view diff] case mismatch in snippet view article find links to article
Yemen. The strike group's Composite Unit Training Exercise included Mobile Security Squadron 2 (MSRON-2), Helicopter Visit, Board, Search and Seizure (HVBSS)
TransApps (5,055 words) [view diff] exact match in snippet view article find links to article
TransApps and other government programs to help inform NIST’s 2012 mobile security guidelines. In addition, not all of the NIST’s findings were security
List of unicorn startup companies (16,988 words) [view diff] exact match in snippet view article find links to article
Retrieved 1 September 2021. Schubarth, Cromwell (13 August 2014). "Mobile security startup Lookout joins $1B unicorns with $150M funding". Silicon Valley
Talon Cyber Security (934 words) [view diff] case mismatch in snippet view article find links to article
technologies for vehicles) and Ohad Bobrov (the founder of Lacoon Mobile Security, which specializes in security for mobile telephones). In April 2021
Rick Osterloh (449 words) [view diff] exact match in snippet view article find links to article
contributed to product development and strategy at Good Technology, a mobile security company. Osterloh later transitioned to Skype and led the software
Norton 360 (2006–2014) (3,940 words) [view diff] case mismatch in snippet view article
360 Premier Edition, Norton Internet Security for Mac®, and Norton Mobile Security. The comparison between Norton 360 editions and Norton One shows all
Internet censorship and surveillance in the Americas (9,539 words) [view diff] case mismatch in snippet view article find links to article
Rights, and Labor, U.S. Department of State, 22 June 2012 Digital and Mobile Security for Mexican Journalists and Bloggers: Results of a survey of Mexican
2012 Malian counter-coup attempt (1,526 words) [view diff] case mismatch in snippet view article find links to article
prisoner who has since disappeared was kicked by a captain. At the Mobile Security Group (GMS) camp, prisoners were subjected to rape, beatings, and burning
List of fellows of IEEE Computer Society (104 words) [view diff] exact match in snippet view article find links to article
recognition 2020 Yingying Chen For contributions to mobile computing and mobile security 2018 Yiran Chen For contributions to spintronic memory 2000 Kwang-Ting