Jamf Blog

Posts in the Security Category

June 13, 2018 by Liarna La Porta

Call Me Maybe: iOS Suggested Contacts feature can be used to phish

Learn about how the iOS Suggested Contacts feature can serve as a vehicle for phishing attacks, and learn how to protect yourself.

May 4, 2018 by Liarna La Porta

4 ways hackers are infiltrating phones with malware on Android phones

It’s not hard to tell if your desktop computer is infected with malware – it might slow down, ads or notifications saying you’ve won a prize keep popping up, it crashes unexpectedly, the fan starts whirring noisily and unfamiliar icons show up on your desktop. But do you know how to check malware on Android phones?

March 7, 2018 by Michelle Base-Bursey

Phishing epicenters: The top 5 TLD used in today’s phishing attacks

At Jamf, we evaluate and investigate every aspect of mobile threats to better understand their makeup and how to best protect against them. That’s why we decided to complete an in-depth analysis of the top-level domains cybercriminals are using the execute their intricate phishing attacks.

February 21, 2018 by Michelle Base-Bursey

What are app permissions - a look into Android app permissions

Guide to app permissions, what they are, how they work and why end-users should be wary of which permissions they grant to certain applications.

January 19, 2018 by Liarna La Porta

Apps that are outliving their developers

What happens when apps that are no longer supported by their developers live on in your phone? Learn about the security, memory and other consequences of leaving discontinued apps lying around.

October 26, 2017 by Daniel Weber

Network Security with Jamf and Cisco

In this JNUC session recap, see what you get when you combine Jamf Pro, macOS and Cisco’s Identity Services Engine (ISE).

October 24, 2017 by Jen Kaplan

CIS: The ball’s in your court

Learn how to utilize open-source tools like scripts and extension attributes to assist with Center for Internet Security (CIS) enforcement.

June 20, 2017 by Nick Thompson

Securing devices smarter with the Center for Internet Security

Discover the Center for Internet Security's recommended steps for safeguarding organizations against cyber attacks.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.