Jamf Blog

Posts in the Jamf Protect Category

August 2, 2018 by Nell Campbell

Four real life phishing examples and how to protect against them

Hackers are engaged in phishing expeditions everywhere: read on for real-life examples and how to protect against them.

June 13, 2018 by Liarna La Porta

Call Me Maybe: iOS Suggested Contacts feature can be used to phish

Learn about how the iOS Suggested Contacts feature can serve as a vehicle for phishing attacks, and learn how to protect yourself.

April 3, 2018 by Liarna La Porta

What exactly is happening when an app leaks data?

What are app leaks and how do I know if my apps are leaking data?

February 18, 2018 by Liarna La Porta

What are third party app stores and are they safe?

Learn more about third party app stores and why people use them even with the risks they can pose for your mobile device.

January 19, 2018 by Liarna La Porta

Apps that are outliving their developers

What happens when apps that are no longer supported by their developers live on in your phone? Learn about the security, memory and other consequences of leaving discontinued apps lying around.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.