Jamf Blog

Posts in the Security Category

October 28, 2019 by Liarna La Porta

How do I know if I’ve been cryptojacked?

Cryptojacking, the unauthorized use of a computer to mine cryptocurrency, is an increasingly common threat. How do you spot the warning signs, and how do you prevent cryptojacking attempts?

October 24, 2019 by Liarna La Porta

Trojan malware infecting 17 apps on the App Store

Jamf's threat research team has discovered 17* apps on the Apple App Store that are infected with clicker trojan malware. The apps communicate with a known command and control (C&C) server to simulate user interactions in order to fraudulently collect ad revenue.

December 19, 2018 by Matt Urwin

Top 5 Types of Sideloaded Apps and the Risks They Pose

It seems there are endless ways in which your mobile device can be attacked. With scary mental images of devious hackers chipping away at our mobile device’s security, it’s easy to forget that the most common way for a device to be compromised is through careless action by the end-user. One such action is to sideload risky applications to the device.

November 2, 2018 by Liarna La Porta

What is Punycode? Fake domains that deceive the human eye

August 3, 2018 by Liarna La Porta

What type of mobile VPN is right for your mobile fleet?

Securing remote connections, encrypting data transmissions and conditional access are only a few of the critical components that make your mobile fleet secure whether your users are connected from the corporate network, working remotely - or a hybrid environment.

June 29, 2018 by Joel Windels

How hackers are using phishing to bypass two-factor authentication

Two-factor authentication has been shown to prevent unauthorized users from accessing protected sites, services and data. But newer forms of attacks are seeing bad actors emulate 2FA sites to effectively sidestep the prompts and users are aiding them in compromising data by unknowingly handing them their credentials.

June 13, 2018 by Liarna La Porta

Call Me Maybe: iOS Suggested Contacts feature can be used to phish

Learn about how the iOS Suggested Contacts feature can serve as a vehicle for phishing attacks, and learn how to protect yourself.

May 4, 2018 by Liarna La Porta

4 ways hackers are infiltrating phones with malware on Android phones

It’s not hard to tell if your desktop computer is infected with malware – it might slow down, ads or notifications saying you’ve won a prize keep popping up, it crashes unexpectedly, the fan starts whirring noisily and unfamiliar icons show up on your desktop. But do you know how to check malware on Android phones?

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.