Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.
As malware doubles on mobile devices and mobility poses a greater risk, virtualization is about protecting data at the source rather than on the device.
A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.
A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.
The settlement marks the largest FCC enforcement action to date, and also involved the FTC and state attorneys general.
The FCC launched an investigation last year after a consumer complained of the practice.
The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.
Hammad Akbar created StealthGenie, which allowed the purchaser to secretly monitor a cell phone's communications.
Hardware makers and solutions providers seek to find the right formula for protecting devices - and data, reports Alan Earls.
New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.
It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.
The update comes soon after the company released iOS 8.0.1, which caused issues for iPhone 6 and iPhone 6 Plus users.
James Comey reportedly said the developments could put consumers "beyond the law."
The update was issued only a week ago, and has now been yanked by the tech giant.
Little progress was made security wise, between the iPhone 5S and iPhone 6 sensor, a researcher found.
A Ponemon Institute study, sponsored by Raytheon, revealed that employees increasingly use mobile devices for work but cut corners and circumvent security.
The mobile operating system, Android L, is expected to be released later this year.
As BYOD and mobile computing become more critical to business, app downloads will raise security risks.
The Android app targets Chinese users, but its malicious techniques could become more widespread in the mobile arena, a security firm warns.
The company followed through on its promise to up iCloud security by implementing two-factor authentication earlier this week.
Yelp will pay $450,000, and TinyCo will pay $300,000 to settle charges that their mobile apps collected information from children under the age of 13.
Google reportedly addressed the issue, but many users likely await the fix from providers or OEMs.
The app is expected to be launched next year.
Of the more than 1,200 mobile apps that were assessed in a recent study, 75 percent requested one or more permissions.
As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.
Best practices for mobile devices highlighted rising threats in a market where BYOD has become standard.
Security experts at SC Congress New York said that well-defined user guidelines set the stage for more efficient, less costly BYOD
With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.
Most BYOD discussions focus on technical issues, such as how to identify offending devices, how to keep them off the network, or how to limit the types of devices. But nobody is talking about the human element.
In the age of mobile, social and cloud, the so-called perimeter that businesses have been protecting for years is now dead.