Security firm McAfee said it's amassed 1.5 million more malware samples in the second quarter of this year compared to the first quarter.
The best practices ask developers to weigh the privacy and security risks before rolling out apps to employees and customers.
Kaspersky Lab researchers say they have detected five new variants of a mobile trojan known as ZitMo, and four of them target BlackBerry devices, which typically have gone untouched by hackers. Users in Europe are being targeted.
A faulty Yahoo Mail application available on Android devices may be the cause of spam messages that have turned up and appear to be sent from mobile phones.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
The "Find and Call" app, which uploads a user's contact list to a remote server so its developers can spam friends and colleagues of the victim, is the first malware to enter the Apple App Store.
Users of Apple's new mobile operating system, set for final release in the fall, will now be able to grant or deny apps from accessing personal data.
Security giant Symantec on Tuesday acquired Nukona, a privately held provider of mobile application management solutions, for an undisclosed amount.
Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.
Apple on Wednesday updated its iOS mobile operating system to rectify more than 80 vulnerabilities.
Researchers from Symantec and North Carolina State University may have stumbled upon one of the largest and most lucrative mobile botnets yet.
Some HTC mobile devices, running on the Android operating system, contain a software bug that could allow attackers to steal a user's Wi-Fi credentials and SSID.
Google appears to be on a mission to dispel the public perception that its Android Market has become a prime vector for malicious activity.
With the Super Bowl less than two weeks away, Symantec researchers said Tuesday that have spotted a malicious application in unofficial Android markets claiming to offer a version of the popular video game Madden NFL 12.
With BYOD, there's a confluence of people bringing in potential dangers from the outside that in turn presents a new class of security concerns that businesses haven't had to consider before.
Researchers have revealed a new type of spam campaign that appears to be a test run to find out how mobile users will respond to social engineering attempts on their smartphones and tablets.
Twitter, which recently acquired year-old Android security start-up Whisper Systems, announced Tuesday that it is making some of the company's open-source code publicly available.
Rogue developers uploaded malicious versions of at least a dozen popular games to the Android Market.
Android phones from leading manufacturers -- including HTC, Motorola and Samsung -- contain pre-loaded applications that do not properly enforce the platform's permission-based security model.
Mobile malware authors have skipped the rudimentary phase and are immediately creating threats that mimic complex malicious code common in the traditional PC environment. But defense technologies are countering with sophistication of their own.
Twitter has acquired a start-up that makes security and management solutions for Android devices.
Google's open source programs manager launched a written tirade against mobile anti-virus companies, which he called "charlatans" and "scammers."
Users of HTC-made Android devices are receiving software security updates to correct a vulnerability that could be exploited by a third-party to steal personal information.
Apple on Wednesday issued much-anticipated updates for its Mac OS X and iOS mobile operating system, adding support for its new iCloud service, and fixing a bevy of security flaws.
A malicious app, masquerading as the online streaming video service Netflix, aims to steal information from Android users, according to Symantec research.
The Federal Trade Commission has settled a case with the maker of a mobile peer-to-peer application over allegations that the program automatically shared files with the public by default. The agency's complaint against FrostWire LLC said this caused consumers who downloaded the app to "unwittingly disclose personal files, like pictures and videos, stored on their smartphones and tablet computers," according to an FTC news release on Tuesday. Under the deal, FrostWire is barred from using default settings that allow these files to be shared and is required to freely update users to a new version that corrects the problem.
A new mobile phone bug stems from an insecure program, called HTCLoggers.apk, which was recently added to some HTC Android devices.
The discovery of new malware that obtains root access to the latest version of Android is a sign that cybercriminals are keeping pace with the evolution of mobile devices.
The Federal Trade Commission has settled its first case involving mobile applications.
A new, malicious Android app disguises itself as Google+ and is capable of stealing data, as well as answering and recording incoming phone calls.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed
- Puush urges users to change passwords after cyber attack