Jamf Blog

Posts in the Security Category

November 2, 2018 by Liarna La Porta

What is Punycode? Fake domains that deceive the human eye

August 3, 2018 by Liarna La Porta

What type of mobile VPN is right for your mobile fleet?

Securing remote connections, encrypting data transmissions and conditional access are only a few of the critical components that make your mobile fleet secure whether your users are connected from the corporate network, working remotely - or a hybrid environment.

June 29, 2018 by Joel Windels

How hackers are using phishing to bypass two-factor authentication

Two-factor authentication has been shown to prevent unauthorized users from accessing protected sites, services and data. But newer forms of attacks are seeing bad actors emulate 2FA sites to effectively sidestep the prompts and users are aiding them in compromising data by unknowingly handing them their credentials.

June 13, 2018 by Liarna La Porta

Call Me Maybe: iOS Suggested Contacts feature can be used to phish

Learn about how the iOS Suggested Contacts feature can serve as a vehicle for phishing attacks, and learn how to protect yourself.

May 4, 2018 by Liarna La Porta

4 ways hackers are infiltrating phones with malware on Android phones

It’s not hard to tell if your desktop computer is infected with malware – it might slow down, ads or notifications saying you’ve won a prize keep popping up, it crashes unexpectedly, the fan starts whirring noisily and unfamiliar icons show up on your desktop. But do you know how to check malware on Android phones?

April 9, 2018 by Liarna La Porta

Malicious profiles – one of the most serious threats to iPhones

Find out how hackers can install malicious profiles onto your iPhone, and what you can do to stop them.

March 7, 2018 by Michelle Base-Bursey

Phishing epicenters: The top 5 TLD used in today’s phishing attacks

At Jamf, we evaluate and investigate every aspect of mobile threats to better understand their makeup and how to best protect against them. That’s why we decided to complete an in-depth analysis of the top-level domains cybercriminals are using the execute their intricate phishing attacks.

February 21, 2018 by Michelle Base-Bursey

What are app permissions - a look into Android app permissions

Guide to app permissions, what they are, how they work and why end-users should be wary of which permissions they grant to certain applications.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.