language:
Find link is a tool written by Edward Betts.Longer titles found: Comodo Mobile Security (view), Mobile Security Deployments (view)
searching for Mobile security 163 found (261 total)
alternate case: mobile security
Wireless security camera
(992 words)
[view diff]
no match in snippet
view article
find links to article
Wireless security cameras are closed-circuit television (CCTV) cameras that transmit a video and audio signal to a wireless receiver through a radio bandSamsung Galaxy A72 (634 words) [view diff] case mismatch in snippet view article find links to article
A52 star in unboxing and promo videos". gsmarena.com. "Samsung Mobile Security". Samsung Mobile Security. Samsung Electronics. Retrieved 22 June 2021.Armor Holdings (660 words) [view diff] case mismatch in snippet view article find links to article
Mobile Security Division were merged into BAE Systems as Mobility & Protection Systems, BAE Systems Products Group, and BAE Systems Mobile Security respectivelySpecial Missions Training Center (1,210 words) [view diff] case mismatch in snippet view article find links to article
the U.S. Navy established a training detachment within SMTC to train Mobile Security Force (MSF) personnel as Tactical Coxswains and Crewmen, and in 2004La Alcaidesa (744 words) [view diff] exact match in snippet view article find links to article
Algeciras and Marbella. The town has two staffed, gated access points and mobile security patrols. A fire station exclusively serving Alcaidesa was built inGood Technology (1,978 words) [view diff] exact match in snippet view article find links to article
Good Technology, owned by BlackBerry Limited, is a mobile security provider headquartered in Sunnyvale, California, United States. The company servesCentigon (company) (980 words) [view diff] exact match in snippet view article
security products and services which in late 2005 reorganized its mobile security division under the Centigon brand name. Centigon was founded in 1998Enlisted Expeditionary Warfare Specialist (330 words) [view diff] case mismatch in snippet view article find links to article
was Petty Officer 2nd Class (EXW/SW) Carl P. Hurtt, Jr, assigned to Mobile Security Squadron Seven (MSS-7). Navy Expeditionary Combat Command (NECC) unitsZDNET (2,360 words) [view diff] no match in snippet view article find links to article
its blog network covers—now "Companies," "Hardware," "Software," "Mobile," "Security" and "Research"—and de-emphasize the downloads and reviews it importedNaval Coastal Warfare (United States) (224 words) [view diff] case mismatch in snippet view article
Maritime Expeditionary Security Force (MESF), formerly known as the Mobile Security Forces (MSF), has the primary mission of force protection conductedCraig Sawyer (615 words) [view diff] case mismatch in snippet view article find links to article
parachuting; and hand-to-hand combat, among others. On High-Threat Mobile Security operations for the U.S. Department of State in Iraq in 2004–2005, SawyerChatSecure (478 words) [view diff] case mismatch in snippet view article find links to article
Freitas (24 October 2013). "ChatSecure v12 Provides Comprehensive Mobile Security and a Whole New Look". GuardianProject.info. Archived from the originalIntegrated Risk Management Services (1,243 words) [view diff] case mismatch in snippet view article find links to article
Integrated Risk Management Services (I-RMS) is the trading name of Business Mobile Security Services Ltd, a private security company based in Naas, Ireland. ItXafecopy Trojan (627 words) [view diff] no match in snippet view article find links to article
"xafecopy-trojan-in-india-which-steals-money-through-mobile-phones-mobile-security". Retrieved 10 September 2017. "В России обнаружена эпидемия четырехSecurity Police (Japan) (1,144 words) [view diff] case mismatch in snippet view article
Clerk Section 1[1] Mobile Security Squad Section 2[2] Mobile Security Squad Section 3[3] Mobile Security Squad Section 4[4] Mobile Security Squad Section 1IronKey (809 words) [view diff] case mismatch in snippet view article find links to article
"Marble Cloud Launches Mobile Security Service for iPhone, Android". eWeek. Retrieved Oct 16, 2012. "Imation to Unify Mobile Security Portfolio around IronKeyMaaS 360 (1,123 words) [view diff] case mismatch in snippet view article find links to article
Vijay (27 January 2023). "IBM to Acquire Fiberlink: What It Means for Mobile Security". Security Intelligence. Retrieved 27 January 2023. DiStefano, JosephGadgetTrak (1,310 words) [view diff] exact match in snippet view article find links to article
GadgetTrak Mobile Security app for Blackberry and Windows mobile devices. iOS – On November 4, 2008, the company launched its first mobile security softwareChicago Transit Authority (3,176 words) [view diff] case mismatch in snippet view article find links to article
CTA and CPD Officials Test Mobile Security Network" (Press release). CTA. December 2, 2006. "CTA to Test Mobile Security Network to Enhance Safety onJon Callas (1,409 words) [view diff] exact match in snippet view article find links to article
considered "one of the most respected and well-known names in the mobile security industry." Callas is credited with creating several Internet EngineeringSimjacker (696 words) [view diff] case mismatch in snippet view article find links to article
"GSMA Mobile Security Research Acknowledgements". Security. Retrieved 2021-07-28. "Simjacker – Next Generation Spying Over Mobile | Mobile Security NewsKevin Mitnick (3,023 words) [view diff] exact match in snippet view article find links to article
2012). "Interview: World's most famous hacker, Kevin Mitnick, on mobile security & Zimperium". Computerworld. Archived from the original on DecemberIPod Touch (1st generation) (474 words) [view diff] no match in snippet view article
Rouse; Joel Scambray; Mike Price (July 30, 2013). Hacking Exposed Mobile: Security Secrets & Solutions. McGraw Hill Education. p. 49. ISBN 9780071817011Giesecke+Devrient (1,678 words) [view diff] case mismatch in snippet view article find links to article
with payment cards, SIM card and eSIM and security solutions into G+D Mobile Security GmbH (G+D MS). In 2018, Build38 was created as a spin-off and tookAkamai Technologies (4,529 words) [view diff] exact match in snippet view article find links to article
combining the Akamai Security and Personalization Services (SPS) mobile security suite and real-time threat intelligence with Plume's Consumer ExperienceFandango Media (2,421 words) [view diff] case mismatch in snippet view article find links to article
Cynthia J.; Romero, Jake (March 4, 2014). "Stop Phoning It in on Mobile Security: What Your Business Needs to Know About the Federal Trade Commission'sHelmut Gröttrup (2,900 words) [view diff] case mismatch in snippet view article find links to article
presented the first smart card which later became the basic product of G+D Mobile Security. Gröttrup retired in 1980. Helmut Gröttrup explaining the basic principlesEntersekt (372 words) [view diff] case mismatch in snippet view article find links to article
Private Equity Investments. In 2017 April, Entersekt won the Best Mobile Security Technology Award at the 2017 Banker Africa Southern Africa BankingDark Caracal (457 words) [view diff] exact match in snippet view article find links to article
campaign was discovered by the Electronic Frontier Foundation and the mobile security firm Lookout, who published their findings on January 18, 2018. TheGlobalSign (1,332 words) [view diff] exact match in snippet view article find links to article
2022-12-15. Murphy, Ian (2019-02-27). "GlobalSign joins Microsoft ISA for mobile security". Enterprise Times. Retrieved 2022-12-15. Jacob, Marc (2022-12-15)Norton Security (494 words) [view diff] case mismatch in snippet view article find links to article
not the latest product updates. Android Operating Systems (Norton Mobile Security for Android was replaced by Norton360 Antivirus & Security) iOS OperatingIBM Cloud (1,544 words) [view diff] no match in snippet view article find links to article
suite of over 100 cloud-based development tools "including social, mobile, security, analytics, database, and IoT (internet of things). Bluemix had grownCIPURSE (1,557 words) [view diff] case mismatch in snippet view article find links to article
Center Enotria ETDA Etertin Corp Facillite FEIG Electronic FIME G+D Mobile Security Gemalto GTech Technologia E Software (Gbits) GuardTek HID Global IDEMIATelephone numbers in Gabon (153 words) [view diff] exact match in snippet view article find links to article
19BP Enquiries 12 Electronic directory 11 International enquiries 16 Mobile security 1718 Police 1730 Fire service 18 Police station 1710 Medical emergenciesHSC-5 (1,578 words) [view diff] case mismatch in snippet view article find links to article
Marine Corps Fleet Anti-Terrorism Security Team (FAST) companies and Mobile Security Squadron Seven (MSS-7), as well as with forces from various alliedSanjay Swamy (375 words) [view diff] exact match in snippet view article find links to article
Government of India's UIDAI. He was the CEO of mobile company mChek, a mobile security and payments solutions company.[citation needed] Sanjay Swamy was bornDanielle Lloyd (1,447 words) [view diff] exact match in snippet view article find links to article
Retrieved 9 October 2008. Gary Fennelly (24 July 2007). "Pin-up Dani backs mobile security campaign". Belfast Telegraph. Archived from the original on 1 AugustDimension Data (1,781 words) [view diff] exact match in snippet view article find links to article
variety of other cybersecurity services. It also offers services for mobile security and data leakage prevention. Dimension Data offers platform-based managedZenprise (659 words) [view diff] case mismatch in snippet view article find links to article
developed and launched a free application on Splunkbase. Called Zenprise Mobile Security Intelligence, the application integrates with Zenprise mobile deviceSamsung India Software Centre (352 words) [view diff] case mismatch in snippet view article find links to article
academic institutes like IITs for research & innovation in domains of AI, Mobile Security, Healthcare, and Audio Processing. The center also has academic tie-upBureau of Diplomatic Security bibliography (538 words) [view diff] case mismatch in snippet view article find links to article
Diplomatic Security WASHINGTON POST article Diplomatic Security - Mobile Security Deployments (MSD) 1996 Secretary of State Warren Christopher presentsJimmy Mann (footballer) (247 words) [view diff] exact match in snippet view article
retiring from football Jimmy Mann returned to hometown Goole as a mobile security officer for Securicor, then as a Co-op milkman and from 1994 a marineHolly Quin-Ankrah (592 words) [view diff] case mismatch in snippet view article find links to article
Echo. Retrieved 9 June 2012. Jones, Catherine (10 December 2004). "Mobile Security; Phones protection". Liverpool Echo. Retrieved 9 June 2012. "Eggs-citingLouis-Gaston Mayila (1,306 words) [view diff] case mismatch in snippet view article find links to article
Decentralization and Mobile Security. He was subsequently promoted to the post of Minister of the Interior, Decentralization, and Mobile Security in early 1995WOT Services (1,229 words) [view diff] case mismatch in snippet view article find links to article
browsing tool for other browsers, including Chrome and Opera. The WOT "Mobile Security & Protection" mobile app was removed from Google Play, approximatelyRSA Conference (1,494 words) [view diff] exact match in snippet view article find links to article
University of Minnesota Greene, Tim (February 3, 2011). "From cloud and mobile security to encryption, security concerns abound as RSA turns 20". Network WorldDelhi Police (2,852 words) [view diff] exact match in snippet view article find links to article
evacuation of Protected Persons, and providing static as well as mobile security to the Protected Persons". : para 2.129 In addition to the MinistryKNOX (106 words) [view diff] exact match in snippet view article find links to article
traditional incense firm in Saxony, Germany Samsung KNOX, an enterprise mobile security solution Knox (disambiguation) This disambiguation page lists articlesMicrosoft Intune (856 words) [view diff] case mismatch in snippet view article find links to article
Microsoft Intune". Cloudinfra.net. Retrieved 18 November 2023. "Enterprise Mobile Security – Microsoft 365". www.microsoft.com. Retrieved 2019-04-10. "OfficeJuniper Networks (6,907 words) [view diff] case mismatch in snippet view article find links to article
2011, Juniper and AT&T announced they would jointly develop the AT&T Mobile Security application based on Juniper's Pulse security software. In May 2012Citrix Endpoint Management (345 words) [view diff] case mismatch in snippet view article find links to article
16 July 2015. Nicole Perlroth (5 December 2015). "Citrix Acquires Mobile Security Start-Up Zenprise". The New York Times. Retrieved 16 July 2015. "CitrixIdeaPad tablets (1,977 words) [view diff] case mismatch in snippet view article find links to article
for Speed: Shift, Kindle for Android, Documents To Go, and Norton Mobile Security. In its review, Gizmodo appreciated the value that the IdeaPad K1 representedWhisper (disambiguation) (604 words) [view diff] exact match in snippet view article
South African two-seat kit motoglider Whisper Systems, an enterprise mobile security company acquired by Twitter in 2011 Whisper X350 Generation II, a SouthGoogle Tensor (2,699 words) [view diff] exact match in snippet view article find links to article
Stephan (October 27, 2021). "Pixel 6: Setting a new standard for mobile security". Google Online Security Blog. Archived from the original on OctoberMoxie Marlinspike (2,072 words) [view diff] exact match in snippet view article find links to article
technology officer and co-founder of Whisper Systems, an enterprise mobile security startup company. In May 2010, Whisper Systems launched TextSecure andParental controls (2,490 words) [view diff] case mismatch in snippet view article find links to article
Application?". 15 August 2016. "Trend Micro Announces the Next Generation Mobile Security Solution for the Android Platform." Benzinga.com 15 Sept. 2011. BusinessEyeVerify (1,411 words) [view diff] exact match in snippet view article find links to article
participant in the Wells Fargo Startup Accelerator for innovators in mobile security. In April 2016, Tangerine Bank became the first Canadian financialAllot (company) (1,274 words) [view diff] exact match in snippet view article
cybersecurity for the connected home. In February, Allot was awarded "best mobile security solution" in the 2018 Cybersecurity Excellence Awards. In July, theSouth Park, San Francisco (1,739 words) [view diff] case mismatch in snippet view article find links to article
collaborative learning platform Hummer Winblad, Venture Capital firm Lookout Mobile Security LookSmart, online advertising Lumosity, Brain fitness Mashape, CloudIOS app approvals (3,287 words) [view diff] case mismatch in snippet view article find links to article
pp. 160 "How Apple is improving mobile app security". "How does iOS Mobile Security work and why do I need it?". 4 August 2014. ""Jekyll" test attack sneaksVerimatrix (1,147 words) [view diff] case mismatch in snippet view article find links to article
2023-11-08. May 8, Tom Field. "Defending Against Emerging Threats in Mobile Security". www.databreachtoday.com.{{cite web}}: CS1 maint: numeric names: authorsJeff Jordan (venture capitalist) (835 words) [view diff] case mismatch in snippet view article
Raises $44 Million From Andreessen Horowitz". Techcrunch. "Lookout Mobile Security Secures $40 Million Investment Led by Andreessen Horowitz". News RoomUnit 8200 (2,956 words) [view diff] case mismatch in snippet view article find links to article
Ventures Imperva Indeni Infinidat Infinipoint IntSights IVIX Lacoon Mobile Security Leadspace LEVL Technologies noname Security Namogoo NICE NSO GroupInternet in Mexico (1,605 words) [view diff] case mismatch in snippet view article find links to article
Freedom on the Net 2011, Freedom House, January 18, 2012 "Digital and Mobile Security for Mexican Journalists and Bloggers". Freedom House. Retrieved 2015-02-22BlackBerry Limited (13,784 words) [view diff] exact match in snippet view article find links to article
announced the release of BlackBerry Secure. Billed as a "comprehensive mobile security platform for the Enterprise of Things", BlackBerry Secure deepenedIBM (11,618 words) [view diff] no match in snippet view article find links to article
towards growing the company's "strategic imperatives" (cloud, analytics, mobile, security, social) in 2015. IBM has been a leading proponent of the Open SourceSheryl WuDunn (1,103 words) [view diff] exact match in snippet view article find links to article
start-up companies in a variety of fields, including healthcare and mobile security. Nicholas D. Kristof; Sheryl WuDunn (12 October 2011). China Wakes:LA Cyber Lab (606 words) [view diff] exact match in snippet view article find links to article
City Cyber Command is a city government agency. Zimperium enterprise mobile security apps are sponsored by State of Michigan, NYC Cyber Command and LosPine Mountain Lake, California (1,226 words) [view diff] exact match in snippet view article find links to article
course with a full-time golf pro, a "country club," and full-time mobile security patrol. The lake is about 2,546 feet (776 m) feet above mean sea levelUSNS Stalwart (722 words) [view diff] exact match in snippet view article find links to article
to an operational training vessel, or to use the vessel solely as a mobile security asset were not practical for the college, despite some efforts in procuringInternational Mobile Equipment Identity (2,638 words) [view diff] exact match in snippet view article find links to article
from the original on 19 July 2019. Retrieved 12 August 2019. "FAQs on mobile security". AMTA.org.au. Archived from the original on 2013-05-22. RetrievedBMW 5 Series (E60) (2,819 words) [view diff] case mismatch in snippet view article
autoblog.com. Autoblog. Retrieved 4 September 2005. "BMW Engineered Mobile Security. Armoured Vehicle Solutions". www.press.bmwgroup.com. BMW Group. RetrievedHeartbleed (9,736 words) [view diff] case mismatch in snippet view article find links to article
Heartbleed scanner module Heartbleed Server Scanner by Rehmann Lookout Mobile Security Heartbleed Detector, an app for Android devices that determines thePara-Commando Brigade (1,125 words) [view diff] exact match in snippet view article find links to article
Commando and 3rd Parachute Battalions were deployed to man static and mobile security posts around government buildings in Brussels, amidst a then-ongoingDSTC (87 words) [view diff] case mismatch in snippet view article find links to article
Diplomatic Security Training Center, a training center for the U.S. Mobile Security Deployment Duluth State Teachers College, previous name of UniversityIn-Q-Tel (2,331 words) [view diff] case mismatch in snippet view article find links to article
2021-05-25. "Tyfone and In-Q-Tel Sign Strategic Agreement to Bring Mobile Security in Cloud and NFC Transactions for U.S. Government – In-Q-Tel". wwwJohn Marshall (entrepreneur) (1,287 words) [view diff] case mismatch in snippet view article
Global Mobile Awards, three 2013 MobITS Awards from CTIA and the Best Mobile Security Solution from SC Magazine. Marshall is a board member on the GeorgiaA5/1 (2,676 words) [view diff] exact match in snippet view article find links to article
Cellphone Crypto - Slashdot "Sources: We were pressured to weaken the mobile security in the 80's". 9 January 2014. Biryukov, Alex; Adi Shamir; David WagnerAV-Comparatives (532 words) [view diff] case mismatch in snippet view article find links to article
Security Reviews / Tests Malware Protection Test Malware Removal Test Mobile Security Review Parental Control Test Performance Test PowerShell-based File-lessLiveView Technologies (561 words) [view diff] case mismatch in snippet view article find links to article
by Ryan Porter and Bob Brenner in 2005. The company creates the D3 Mobile Security Unit, a solar-powered surveillance trailer with cameras on a 22-footCarrier Strike Group Nine 2004–09 operations (5,305 words) [view diff] case mismatch in snippet view article find links to article
group's 2007 pre-deployment Composite Unit Training Exercise included Mobile Security Squadron 2, and Helicopter Visit, Board, Search and Seizure (HVBSS)Nokia E6 (2,531 words) [view diff] case mismatch in snippet view article find links to article
JoikuSpot Premium (mobile WiFi hotspot), World Traveler, F-secure Mobile Security and QuickOffice. The stock OS version Symbian Anna was specially adaptedPixel 6 (5,976 words) [view diff] exact match in snippet view article find links to article
Stephan (October 27, 2021). "Pixel 6: Setting a new standard for mobile security". Google Online Security Blog. Archived from the original on OctoberAegis Defence Services (1,040 words) [view diff] exact match in snippet view article find links to article
reconstruction program. These services include: Providing static and mobile security details for the PCO and United States Army Corps of Engineers; MaintainingPohang Operation (3,316 words) [view diff] exact match in snippet view article find links to article
approaches inaccessible to armor. Smith, therefore, decided to emphasize mobile security operations and made linear defense a secondary mission.: 353 The enemySierra Ventures (1,185 words) [view diff] exact match in snippet view article find links to article
advertising attribution company, acquired by Google in 2014. AuthenTec – mobile security company, acquired in 2012 by Apple for $365 million. Bina TechnologiesG4S (5,288 words) [view diff] exact match in snippet view article find links to article
services' is another core service, where G4S provides key holding, mobile security patrol and response services and alarm receiving and monitoring facilitiesMobile Mail-Screening Station (393 words) [view diff] exact match in snippet view article find links to article
Group, which is formed to secure national security special events. "Mobile security: Mail screening hits the road". usps.com. U.S. Postal Service. RetrievedFirefox OS (4,940 words) [view diff] exact match in snippet view article find links to article
into Firefox OS, a core feature of the platform. Janne Lindqvist, a mobile security researcher at the Rutgers University WINLAB, expressed concern aboutGary Cohn (2,890 words) [view diff] case mismatch in snippet view article find links to article
Adviser". Bloomberg.com. 2018-10-12. Retrieved 2019-12-24. "About us - Mobile Security". Sotera. Retrieved 2024-03-14. "Gary Cohn Joins MZ Board of Directors"Hacker Halted (516 words) [view diff] case mismatch in snippet view article find links to article
Governance, Policies & Standards Business Continuity & Disaster Recovery Mobile Security Virtualization Security Secure Programming Malware and Botnets SocialChris Wysopal (781 words) [view diff] exact match in snippet view article find links to article
using an instrumented sandbox and machine learning classification for mobile security U.S. Patent 8,613,080, Assessment and analysis of software securityGreg Garcia (government official) (271 words) [view diff] case mismatch in snippet view article
February 7, 2017. "Former DHS And Bank Of America Exec Greg Garcia Talks Mobile Security, 21st Century Warfare, Cyber Crime". Washington Executive. J MediaInternational Women's Media Foundation (1,995 words) [view diff] exact match in snippet view article find links to article
women's organizations. In September 2015, the IWMF released a free mobile security app designed for journalists. The app was received critically by securityUSS Cole bombing (5,527 words) [view diff] case mismatch in snippet view article find links to article
from terrorist attack. MARFPCOM aligned four existing components: the Mobile Security Forces, Naval Coastal Warfare, Explosive Ordnance Disposal (EOD), andEndgame, Inc. (949 words) [view diff] exact match in snippet view article find links to article
data exploits. Endgame acquired Onyxware in 2014, a Florida-based mobile security technology company which provides applications for detecting third-partyOrange S.A. (8,861 words) [view diff] exact match in snippet view article find links to article
10 September 2009. Reuben, Emily (22 November 2006). "Concern over mobile security". Channel 4 News. Archived from the original on 15 October 2007. RetrievedUSS Abraham Lincoln (CVN-72) (7,440 words) [view diff] case mismatch in snippet view article
Group Nine's Composite Unit Training Exercise featured 24 sailors from Mobile Security Squadron 2 (MSRON-2), Helicopter Visit, Board, Search and Seizure TeamSamsung Electronics (17,313 words) [view diff] exact match in snippet view article find links to article
Electronics announced the company had expanded the Samsung Knox enterprise mobile security platform with the introduction of Samsung Knox Guard. It allows companiesSamy Kamkar (2,088 words) [view diff] exact match in snippet view article find links to article
Kamkar traveled to more than a dozen countries speaking about his mobile security research and weaknesses he discovered from his cryptanalysis of theWatchGuard (861 words) [view diff] case mismatch in snippet view article find links to article
20, 2017. Retrieved July 31, 2018. "2017 Mobility 100: 30 Coolest Mobile Security And Device Management Vendors". crn.com. May 8, 2017. Retrieved AugustIris Capital (845 words) [view diff] exact match in snippet view article find links to article
Kyriba – France/US: treasury solutions in the cloud Lookout – US: mobile security PlaceIQ – US: Location intelligence services Quantifind – US ReBuySHSH blob (1,422 words) [view diff] case mismatch in snippet view article find links to article
Katie (2011). iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Elsevier. pp. 47–50. ISBN 9781597496599BlackBerry Priv (3,088 words) [view diff] case mismatch in snippet view article find links to article
Vox Media. 8 October 2015. Retrieved 3 November 2015. "Snapdragon Mobile Security for Embedded Devices, Biometric Authentication and SafeSwitch Technology"Fountain of Light (658 words) [view diff] exact match in snippet view article find links to article
addition to the services Miller mentions there were also a bookstore, a mobile security patrol, a small research library, and a shortwave radio network connectingList of mergers and acquisitions by Apple (4,474 words) [view diff] exact match in snippet view article find links to article
Audio Italy — Logic Pro, GarageBand 41 July 27, 2012 AuthenTec PC and mobile security products United States 356,000,000 Touch ID 42 September 27, 2012Mark Edwards (British businessman) (346 words) [view diff] case mismatch in snippet view article
Mformation and F-Secure Partner to Provide Remote Management for F-Secure Mobile Security Solution". Mformation.com. 12 November 2008. Retrieved 26 July 2012Cloud Security Alliance (1,373 words) [view diff] case mismatch in snippet view article find links to article
Devices". Redmondmag.com. Retrieved 2013-08-22. "The Evil Eight: Top Mobile Security Threats | How-To | Mobile Enterprise(ME)". Mobileenterprise.edgl.comList of mergers and acquisitions by BlackBerry (925 words) [view diff] exact match in snippet view article find links to article
communications United States Undisclosed 30 4 August 2015 Good Technology Mobile security provider United States $425 million 31 19 February 2016 EncriptionSmart card (12,137 words) [view diff] case mismatch in snippet view article find links to article
Michael (2013). Giesecke+Devrient (ed.). From Eurocheque Card to Mobile Security 1968–2012. Battenberg Gietl Verlag. ISBN 978-3866465497. JurgensenSignal (messaging app) (11,632 words) [view diff] exact match in snippet view article
encrypting other forms of data. All of these were proprietary enterprise mobile security software and were only available for Android. In November 2011, WhisperKeepVault (423 words) [view diff] exact match in snippet view article find links to article
users", Press Release, 11/05/2006 "AuthenTec Buys Proxure" "Apple buys mobile security firm AuthenTec for $356 million", Reuters "KeepVault Change of Ownership"LowRISC (572 words) [view diff] case mismatch in snippet view article find links to article
and collaboratively developed by Google, ETH Zurich, Nuvoton, G+D Mobile Security, Seagate, and Western Digital. The OpenTitan source code is availableSubstance abuse prevention (3,618 words) [view diff] case mismatch in snippet view article find links to article
US Navy Master-at-Arms 1st Class Michael Turner of Mobile Security Squadron Two (MSS-2) collects information at the Substance Abuse Prevention SummitNinetology U9Z1+ (362 words) [view diff] case mismatch in snippet view article find links to article
Maps, News and Weather Application, Voice Recorder, Adobe Reader, NQ Mobile Security, NQ Valut, M Warranty "Get yourself Urbanite, get U9". enterpriseitnewsNecuno (248 words) [view diff] case mismatch in snippet view article find links to article
original on 2019-03-07. Retrieved 2019-03-07. "Necunos - Redefining Mobile Security". Necuno Solutions. Tung, Liam. "First truly open-source smartphoneMobiWire (372 words) [view diff] case mismatch in snippet view article find links to article
MobiWire Unveils Secure Business Phone Portfolio With Embedded Mobile Security https://web.archive.org/web/20110402092224/http://www.droid-denInfysec (499 words) [view diff] case mismatch in snippet view article find links to article
dead link] DoWebScan website security scanner Capture the Flag Cyber Sec Tabloid, Cyber Security News Hub Andro Sentry, Mobile Security and AntivirusAnchorFree (1,026 words) [view diff] exact match in snippet view article find links to article
2019-04-16. Velazco, Chris. "AnchorFree brings their Hotspot Shield mobile security app to Android". TechCrunch. Retrieved 8 April 2013. WilliamsRegional Security Office (628 words) [view diff] case mismatch in snippet view article find links to article
Diplomatic Security WASHINGTON POST article Diplomatic Security - Mobile Security Deployments (MSD) 1996 Secretary of State Warren Christopher presentsKcell (1,747 words) [view diff] exact match in snippet view article find links to article
three years. 230 free master classes on such themes as mobile media, mobile security, mobile education, mobile state, mobile business, as well as the courseRISC-V (13,517 words) [view diff] exact match in snippet view article find links to article
Barbello, Brandon (27 October 2021). "Pixel 6: Setting a new standard for mobile security". Google Security Blog. Archived from the original on 27 October 2021Regional Security Officer (1,036 words) [view diff] case mismatch in snippet view article find links to article
Diplomatic Security WASHINGTON POST article Diplomatic Security - Mobile Security Deployments (MSD) 1996 Secretary of State Warren Christopher presentsArxan Technologies (1,138 words) [view diff] case mismatch in snippet view article find links to article
Company 2015 Mobile Innovations Award Winner for Best Management of Mobile Security Issues Info Security Products Guide 2014 Winner for Best New Product:TextSecure (3,426 words) [view diff] exact match in snippet view article find links to article
provided encrypted voice calls. All of these were proprietary enterprise mobile security software. In November 2011, Whisper Systems announced that it had beenEnterproid (416 words) [view diff] exact match in snippet view article find links to article
[citation needed] Enterproid was founded in 2010 by former Morgan Stanley mobile security and IT executives. The founding team includes CEO Andrew Toy, COO AlexanderAntoine Mboumbou Miyakou (605 words) [view diff] case mismatch in snippet view article find links to article
was appointed Minister of the Interior, Local Collectivities, and Mobile Security. He was then moved to the position of Minister of Transport, MerchantShomrim (neighborhood watch group) (6,434 words) [view diff] exact match in snippet view article
houses and cars. In 2009 the Flatbush Shomrim acquired a $250,000 mobile security command center which is similar to NYPD command centers, includingNORTHAG wartime structure in 1989 (12,153 words) [view diff] case mismatch in snippet view article find links to article
425 Mobile Security Infantry Company, 't Harde, to secure the transport and field storage of nuclear warheads for 19th Artillery Battalion 434 Mobile SecurityMarkus Jakobsson (1,225 words) [view diff] exact match in snippet view article find links to article
various forms on online fraud. His later research was focused toward mobile security and the detection of malware on mobile platforms. In a 1999 paper heDavid Ferrie (4,364 words) [view diff] case mismatch in snippet view article find links to article
Falcon Cadet Squadron. An offshoot of this group was the Internal Mobile Security Unit, a group formed for the fight against Fidel Castro's Cuba. OverGSM 03.48 (373 words) [view diff] exact match in snippet view article find links to article
Mobile security protocolOtto Otepka (702 words) [view diff] case mismatch in snippet view article find links to article
Agents Association Unofficial Diplomatic Security Special Agent Forum Mobile Security Deployments (MSD) Computer Investigations & Forensics InvestigativeMarkAny (624 words) [view diff] exact match in snippet view article find links to article
Korea Products Computer security solutions for document security, mobile security, electronic document anti-forgery, CCTV video footage, and multimediaMilitary history of Chad (2,424 words) [view diff] exact match in snippet view article find links to article
addition to strengthening the regular army, the government increased mobile security companies of the National Gendarmerie, equipped as light infantry,Spice Stellar Nhance Mi-435 (398 words) [view diff] case mismatch in snippet view article find links to article
Nhance can be enhanced is secured with a 6-month subscription to NQ Mobile Security. It has an 8 MP camera with flash at rear and 1.3 MP camera at theYingying Chen (404 words) [view diff] exact match in snippet view article find links to article
2020 class of fellows, "for contributions to mobile computing and mobile security". She was named as a fellow of the National Academy of Inventors inList of Russian inventors (2,312 words) [view diff] case mismatch in snippet view article find links to article
Federation Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Mobile Security anti-virus products Adolphe Kégresse (1879–1943) France Russian EmpireRemote mobile virtualization (1,351 words) [view diff] exact match in snippet view article find links to article
but for remoting mobile OSes". Retrieved 9 June 2015. "Redefine your mobile security strategy with Virtual Mobile Infrastructure". "Desktop virtualizationRafael O'Ferrall (1,551 words) [view diff] exact match in snippet view article find links to article
Iraqi Freedom / Operation Noble Eagle. O'Ferrall managed and directed mobile security teams to complete over 242 security missions aboard 173 Military SealiftBizTech (169 words) [view diff] case mismatch in snippet view article find links to article
in the United States. "Inspirage Chief Security Officer Discusses Mobile Security with BizTech Magazine". inspirage.com., March 6, 2017 "Digital TransformationJeremy Burge (3,100 words) [view diff] exact match in snippet view article find links to article
2023. Retrieved 5 August 2023. Cook, James (4 March 2019). "Facebook mobile security loophole lets anyone look up your profile". The Telegraph. ISSN 0307-1235Blk71 (812 words) [view diff] exact match in snippet view article find links to article
across Asia, Daylight Studios, a mobile game developer and Appknox, a mobile security company. However, there are also a few hardware tech companies, suchMocana (1,182 words) [view diff] exact match in snippet view article find links to article
replaced Isaacs in April 2016. In April 2016, Mocana spun off its mobile security business to Blue Cedar Networks. William Diotte replaced Graham asCrypto Wars (4,059 words) [view diff] exact match in snippet view article find links to article
Usenet: 2ts9a0$95r@lyra.csx.cam.ac.uk. "Sources: We were pressured to weaken the mobile security in the 80's". Aftenposten. Stallings, W.: Cryptography and networkList of Israeli companies listed on the Nasdaq (2,066 words) [view diff] case mismatch in snippet view article find links to article
Year Listed Year Delisted Sector Fate Ability Inc ABILF 2016 2018 Mobile Security Now OTC. Accord Networks Ltd. ACCD 2000 2000 Networking & communicationsWendell Brown (2,261 words) [view diff] exact match in snippet view article find links to article
in 2016, and introduced its Direct Autonomous Authentication (DAA) mobile security technology in 2018. Multinational telecommunications provider TelefónicaCritical Start (880 words) [view diff] exact match in snippet view article find links to article
the agreement, Critical Start acquired its native iOS and Android mobile security operations center application. In August 2019, Critical Start publishedOpen Whisper Systems (4,322 words) [view diff] exact match in snippet view article find links to article
Whisper Systems in 2010. The company produced proprietary enterprise mobile security software. Among these were an encrypted texting program called TextSecureRemo Sync (580 words) [view diff] exact match in snippet view article find links to article
Data transmission is encrypted with SSL. RemoSync implements all mobile security features available on Microsoft Exchange. RemoSync 3.0 and later versionsAllied Minds (798 words) [view diff] exact match in snippet view article find links to article
Corp. to share intellectual property and technology in the cyber and mobile security field. This partnership was later expanded in July 2016 to provideLos Angeles Police Department resources (5,051 words) [view diff] case mismatch in snippet view article find links to article
Administrative Platoon, Metropolitan Division RP Security Services Division Mobile Security Patrol S Senior Lead Officer (Two Uniformed Officers) SL Senior LeadRafay Baloch (2,276 words) [view diff] case mismatch in snippet view article find links to article
Patch to Same Origin Policy Bypass in Old Android Devices". Zimperium Mobile Security Blog. 2015-01-15. Retrieved 2019-08-19. "Android security shift exposesIntelligent Energy (2,375 words) [view diff] case mismatch in snippet view article find links to article
Awards: European Business Awards announce 2009 Ruban d'Honneur Winners. Mobile Security Zone. 27 November 2008. Retrieved 19 June 2013. Rushlight Awards 2010Carrier Strike Group 9 (9,035 words) [view diff] case mismatch in snippet view article find links to article
Yemen. The strike group's Composite Unit Training Exercise included Mobile Security Squadron 2 (MSRON-2), Helicopter Visit, Board, Search and Seizure (HVBSS)TransApps (5,055 words) [view diff] exact match in snippet view article find links to article
TransApps and other government programs to help inform NIST’s 2012 mobile security guidelines. In addition, not all of the NIST’s findings were securityList of unicorn startup companies (16,988 words) [view diff] exact match in snippet view article find links to article
Retrieved 1 September 2021. Schubarth, Cromwell (13 August 2014). "Mobile security startup Lookout joins $1B unicorns with $150M funding". Silicon ValleyTalon Cyber Security (934 words) [view diff] case mismatch in snippet view article find links to article
technologies for vehicles) and Ohad Bobrov (the founder of Lacoon Mobile Security, which specializes in security for mobile telephones). In April 2021Rick Osterloh (449 words) [view diff] exact match in snippet view article find links to article
contributed to product development and strategy at Good Technology, a mobile security company. Osterloh later transitioned to Skype and led the softwareNorton 360 (2006–2014) (3,940 words) [view diff] case mismatch in snippet view article
360 Premier Edition, Norton Internet Security for Mac®, and Norton Mobile Security. The comparison between Norton 360 editions and Norton One shows allInternet censorship and surveillance in the Americas (9,539 words) [view diff] case mismatch in snippet view article find links to article
Rights, and Labor, U.S. Department of State, 22 June 2012 Digital and Mobile Security for Mexican Journalists and Bloggers: Results of a survey of Mexican2012 Malian counter-coup attempt (1,526 words) [view diff] case mismatch in snippet view article find links to article
prisoner who has since disappeared was kicked by a captain. At the Mobile Security Group (GMS) camp, prisoners were subjected to rape, beatings, and burningList of fellows of IEEE Computer Society (104 words) [view diff] exact match in snippet view article find links to article
recognition 2020 Yingying Chen For contributions to mobile computing and mobile security 2018 Yiran Chen For contributions to spintronic memory 2000 Kwang-Ting