Privacy Policy</a>." data-cc-allow="Allow" data-cc-dismiss="To edit your cookie settings, <a class='cc-revoke'>click here</a>." data-cc-deny="Decline" data-cc-revoke="Cookie Policy" data-cc-privacy-policy="Privacy Policy" data-cc-privacy-url="/privacy-policy/" data-http-status-code="200" > Security - Page 42 | Blog | Jamf

Jamf Blog

Posts in the Security Category

November 13, 2019 by Matt Woodruff

Announcing Jamf Protect – Jamf’s endpoint security solution purpose-built for Mac

Matt Woodruff, Security Solutions Lead, and Andrew Medearis, Senior Product Manager of Jamf Protect, took the stage at JNUC to dive into everything you need to know about Jamf’s latest addition to its product line and why Jamf is expanding into Mac security.

November 12, 2019 by Jonathan Locast

The Mac security lesson you may need: “Eat your own dog food”

Security experts discuss the importance of "living in the shoes of a normal user, not an admin” during this JNUC 2019 session.

October 28, 2019 by Liarna La Porta

How do I know if I’ve been cryptojacked?

Cryptojacking, the unauthorized use of a computer to mine cryptocurrency, is an increasingly common threat. How do you spot the warning signs, and how do you prevent cryptojacking attempts?

October 24, 2019 by Liarna La Porta

Trojan malware infecting 17 apps on the App Store

Jamf's threat research team has discovered 17* apps on the Apple App Store that are infected with clicker trojan malware. The apps communicate with a known command and control (C&C) server to simulate user interactions in order to fraudulently collect ad revenue.

June 26, 2019 by Kat Garbis

Apple device security misconceptions (and how to get ahead of them)

Security is a top priority for any IT admin, no matter which platform(s) they are supporting. Read this for a tutorial on Apple device security.

December 19, 2018 by Matt Urwin

Top 5 Types of Sideloaded Apps and the Risks They Pose

It seems there are endless ways in which your mobile device can be attacked. With scary mental images of devious hackers chipping away at our mobile device’s security, it’s easy to forget that the most common way for a device to be compromised is through careless action by the end-user. One such action is to sideload risky applications to the device.

November 2, 2018 by Liarna La Porta

What is Punycode? Fake domains that deceive the human eye

August 3, 2018 by Liarna La Porta

What type of mobile VPN is right for your mobile fleet?

Securing remote connections, encrypting data transmissions and conditional access are only a few of the critical components that make your mobile fleet secure whether your users are connected from the corporate network, working remotely - or a hybrid environment.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.