Palo Alto Networks Unit 42 researchers have identified the backdoor on numerous devices, so far leaving more than 10 million users vulnerable.
2015 is setup to be one of the most dangerous years for not only your PC but also your mobile devices and cloud storage.
Back in October, the Chinese iOS trojan was discovered by Lacoon Mobile Security.
As we all gear up for the holidays with plans to purchase any number of items online, cyberthieves too are gearing up with more and more creative ways to steal money, credentials and critical data from any number of organizations.
WireLurker illuminates that mobile applications expand the perimeter to include new risks that may be neglected.
Encrypted communications between a Samsung smartwatch and Android device were easily cracked by Bitdefender researchers.
Mobile Devices has seen unprecedented growth since their introduction and now form an integral part of our daily lives. Yet, many Enterprises have not fully embraced mobile as part of their strategy because of too many unanswered questions.
New Cloudmark research shows that bank and account phishing has become the top SMS attack in the U.S. in recent months.
Hammad Akbar, the CEO of companies that sold and advertised mobile spyware app StealthGenie, will pay the fine in what's considered a landmark criminal conviction.
A researcher at Symantec traced DroidJack's origins back to legitimate Android app developers and previous RATs.
Security firm Zimperium detected attacks in the wild over the past six to eight months.
Mobile security firm Lookout detailed how the malware has grown in complexity to hide its botnet activity.
More and more corporate activities are being undertaken by employees depending on iPhones, iPads, laptops and other mobile devices.
The U.S. Department of Justice is attaching small devices to airplanes that gather massive amounts of mobile phone data, including the data of innocent Americans, a Wall Street Journal report indicates.
One-time passwords (OTPs) sent via SMS are increasingly the target of Android malware, the report by Javelin revealed.
American Express Token Service is based on a technical framework developed by EMVCo.
There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.
The tool, called "notogotofail," tests whether devices and applications are secured against known TLS/SSL flaws and misconfigurations.
Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
Modern mobile hacks are diverse and can be performed by anyone, from an inexperienced amateur to highly skilled teams operating like tech startups.
Apple's iPhone 6 and iOS 8 offer encryption for mobile users, but a focus on consumers can create security conundrums, reports Lee Sustar.
When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.
As mobile devices are further integrated into networks, organizations will have a critical need to implement end-to-end security solutions.
Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.
As malware doubles on mobile devices and mobility poses a greater risk, virtualization is about protecting data at the source rather than on the device.
A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.
A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.
The settlement marks the largest FCC enforcement action to date, and also involved the FTC and state attorneys general.
The FCC launched an investigation last year after a consumer complained of the practice.
The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- Neverquest botnet furthers crimeware-as-a-service biz for fraudsters
- Solo attacker likely responsible for phishing campaign, delivering Zeus variant
- Telecommunications companies on the line with FTC, FCC for cramming schemes
- The 10 POS malware families this holiday season
- White House calls Sony hack a "serious national security matter," gov't mulls proper response