Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » M »

mobile security apps

Mobile security apps are applications designed for smartphone and tablet mobile devices to protect and secure the device and its data from unauthorized access in the case of theft or accidental loss. Some mobile security apps can also help users locate their device if it’s lost or stolen.

Additional security features typically offered by mobile security apps include malware detection and removal, VPN connectivity for protecting data in transit, scanning websites for potential phishing schemes or other fraudulent activity and more.

Whereas most of the mobile security apps in Apple’s iOS are built into the mobile operating system, numerous third-party mobile security apps are available for Google’s Android mobile OS platform, Microsoft’s Windows Phone and, to a lesser extent, iOS. Well-known security companies like Norton, McAfee, Lookout, BitDefender and ESET offer mobile security apps for Android, Microsoft Windows Phone and/or iOS.

The Problem with Statistics

We look at a few of the more troubling aspects of statistics and how these may be used to advance an agenda or skew the facts to someone's... Read More »

29 Free Android Apps for Cash-Strapped Students

From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »

Sharing Threat Intelligence

A growing number of startups make the sharing of threat intelligence a key part of their solutions. Read More »

The 7 Layers of the OSI Model

The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

Computer Architecture Study Guide

This Webopedia  study guide describes the different parts of a computer system and their relations. Read More »