Mobile Security

Google car software attains 'driver' status

Google car software attains 'driver' status

By

The National Highway Transportation Safety Administration may not have gone so far as to call the software controliong the Google car human, but the agency did allow it can be viewed as the driver.

Report: Pros urged to roll out IT projects before they are security-ready

Report: Pros urged to roll out IT projects before they are security-ready

By

IT security professionals report that they are regularly pressured to roll out new technologies and devices regardless of whether they are secure, according to a new survey.

AlienSpy returns as cross-platform backdoor

By

The AlienSpy remote access Trojan has evolved into a cross-platform backdoor that affects Windows, Linux, Mac OS X and Android operating systems.

Mozilla unveils timetable for discontinuing Firefox OS

Mozilla unveils timetable for discontinuing Firefox OS

By

Mozilla yesterday shed new light on its plan to phase out its Firefox operating system and instead focus on Internet of Things solutions, with an emphasis on data privacy and security.

 Integrating mobile: Mobile security

Integrating mobile: Mobile security

From sales staff working the floor in large stores to corporate road warriors flitting from city to city, there is no debate about the degree to which mobile devices have increased productivity.

Researchers spot trojan targeting dozens of Google Play games

Researchers spot trojan targeting dozens of Google Play games

By

Researchers at Dr. Web spotted the Android.Xiny.19.origin trojan incorporated into more than 60 games in the Google Play Store.

Major banks to roll out ATMs that use smartphones for authentication

Major banks to roll out ATMs that use smartphones for authentication

By

Bank of America, Wells Fargo and JPMorgan Chase have announced plans to roll out ATMs that take smartphones as well as ATM cards.

MediaTek code exposes Android KitKat devices

MediaTek code exposes Android KitKat devices

By

Independent security researcher Justin Case discovered a "backdoor" in a processor made by manufacturer MediaTek.

Integrating mobile: Mobile security

Integrating mobile: Mobile security

Even the best security people can't be expected to know the whole zoo of devices being used across a large organization, reports James Hale.

LG G3 vulnerability allows arbitrary JavaScript code

LG G3 vulnerability allows arbitrary JavaScript code

By

Researchers at BugSec and Cynet discovered a bug in the LG G3 Android smartphone that could allow an attacker to run arbitrary code.

Phishing scheme mimics iCloud to activate stolen iPhones

Phishing scheme mimics iCloud to activate stolen iPhones

By

Researchers at Malwarebytes have spotted thieves using a phishing scheme to unlock stolen iPhones.

Android ransomware variant adds clickjacking to bag of tricks

Android ransomware variant adds clickjacking to bag of tricks

By

Sixty-seven percent of Android devices are prone to a newly discovered ransomware variant - the first to employ "clickjacking" as a way to fool users into giving away their administrator rights, Symantec warned today in its Security Response blog.

Gemalto reporting on a global lack of payment data security

Gemalto reporting on a global lack of payment data security

New research by the Ponemon Institute commissioned by Gemalto is showing there is a critical need for organisations to improve their payment data security practices.

Samsung security update fixes critical bugs hidden in Galaxy devices, Android OS

Samsung security update fixes critical bugs hidden in Galaxy devices, Android OS

By

The latest maintenance release from Samsung will include security patches that address several vulnerabilities capable of triggering arbitrary code executions, causing memory corruptions, or rebooting factory reset protections and reactivation locks (FRP/RL).

Opponents to Swiss surveillance law force direct public vote

Opponents to Swiss surveillance law force direct public vote

By

A Swiss digital surveillance law that has rankled online privacy advocates will now subjected to a public vote, after opponents collected enough signatures to challenge the legislation.

Video: 'It's asymmetrical warfare' between the hackers and defenders

Video: 'It's asymmetrical warfare' between the hackers and defenders

Mushrooming numbers of BYOD and IOT devices is putting corporate networks at risk, says ForeScout CEO Michael DeCesare in an exclusive video interview.

Lenovo patches problems found in SHAREit app

Lenovo patches problems found in SHAREit app

By

Lenovo issued patches to fix four issues found on some ThinkPad and IdeaPad devices that use the SHAREit app, including allowing remote system access and unauthorized access of transferred files.

Survey says: Data breaches in other industries will damage financial institutions

Survey says: Data breaches in other industries will damage financial institutions

By

Respondents to a new survey from FICO unanimously agreed: Data breaches this year in other industries will damage financial institutions.

Google: Linux flaw impact on Android devices not as widespread as predicted

Google: Linux flaw impact on Android devices not as widespread as predicted

By

After patching a critical flaw in the Android OS's code and releasing it to open source, Google hinted that Perception Point's estimate that more than two-thirds of the devices would be impacted by the Linux vulnerability was "exaggerated,"

Kaspersky detects surge in 'Asacub' mobile banking trojan attacks

Kaspersky detects surge in 'Asacub' mobile banking trojan attacks

By

What was once a low-threat, basic spyware trojan has evolved into very powerful banking malware capable of giving hackers near-total control over one's Android device, warned Kaspersky Lab yesterday.

Unregulated Chinese firms sell IMSI catchers on black market

Unregulated Chinese firms sell IMSI catchers on black market

By

Unregulated Chinese tech companies are selling IMSI catchers on the black market to oppressive regimes.

N.Y. State bill calling for smartphone backdoors still in play

N.Y. State bill calling for smartphone backdoors still in play

By

A bill that languished in the New York State Assembly last year that would require smartphone manufacturers to build a backdoor into their encrypted devices is still alive and could potentially be voted on at some point this year.

SlemBunk trying to become a slam dunk banking trojan: FireEye

SlemBunk trying to become a slam dunk banking trojan: FireEye

By

The recently discovered mobile-banking trojan SlemBunk is proving more resilient than first thought and is actively being used in several on-going campaigns.

In time, the smartwatch will make us vulnerable

In time, the smartwatch will make us vulnerable

Smartwatches and other wearable devices may make us vulnerable whenever we don them due to their motion sensors.

Sean Penn, 'El Chapo' used encryption, burner phones to communicate

Sean Penn, 'El Chapo' used encryption, burner phones to communicate

By

Sean Penn and Rolling Stone Editor Jann Wenner said the actor/director and the magazine took a number of security measures—including the use of "burner"phones and encryption to communicate and set up an interview with fugitive drug lord El Chapo.

We can read encrypted emails on BlackBerry devices, Dutch team says

We can read encrypted emails on BlackBerry devices, Dutch team says

By

Despite an encrypted email service on BlackBerry smartphones, forensic investigators in the Netherlands said they can read encrypted messages sent on the devices.

Android smart TVs could expose users to cyber home invasion

Android smart TVs could expose users to cyber home invasion

By

Researchers have spotted cybercriminals targeting vulnerable Android-based smart TVs with malicious apps capable of cyber home invasions.

DarkSideLoader rogue app store available to non-jailbroken iOS devices

DarkSideLoader rogue app store available to non-jailbroken iOS devices

By

Researchers identified a rogue app store that is accessible from anywhere in the world and allows users to download iOS apps to non-jailbroken devices.

Cake Tower-related rooting apps found in Google Play

Cake Tower-related rooting apps found in Google Play

By

Researchers discovered 13 apps related to the malicious game Brain Test in the Google Play store.

Backdoor battle puts encrypted phone vendors in untenable position

Backdoor battle puts encrypted phone vendors in untenable position

By

Macate, a manufacturer of secure smartphones, is finding itself caught smack dab in the middle of the battle raging between the federal forces looking to require backdoors on encrypted devices and those opposing that idea.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US