Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Sophos Launches Free AV Solution For Android

Sophos Mobile Security for Android

Sophos on Monday officially launched Sophos Mobile Security, a free mobile security solution designed to protect Android devices against malware, privacy issues and lost hardware.

Sophos Mobile Security for Android

Sophos on Monday officially launched Sophos Mobile Security, a free mobile security solution designed to protect Android devices against malware, privacy issues and lost hardware.

With minimal impact on device performance or battery life, Sophos says the solution makes use of near real-time intelligence from its network of threat intelligence centers and automatically scans apps as users attempt to install them, and blocks potentially dangerous apps and malicious code. Sophos Mobile Security also helps locate lost or stolen Android devices and provides a remote lock to help lock down and protect data in the event a mobile device is lost of left behind.

In its 2011 Mobile Threats Report, Juniper Networks said there was a 155 percent increase in mobile malware across all mobile platforms in 2011, and a whopping 3,325 percent increase in malware specifically targeting the Android platform in the last seven months of 2011 alone. 

“We’re seeing no slowdown in the number of malicious apps, as more smartphone owners use their devices to not only store personal data, but also access social networks and the Internet,” said Matthias Pankert, vice president, product management, Sophos. “Android users must be vigilant as the number of threats continues its rapid ascent…”

The company said that later this year it will offer a managed Enterprise version of Sophos Mobile Security that will come with enhanced functionality and provide better protection for corporate devices and data.

Sophos Mobile Security is available from Google Play here

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.