Mobile Security

Cloud-managed IT security — Simple. complete. powerful.

IT security is more challenging than ever. IT departments are tasked with managing a roaming workforce with limited resources and budget. Security solutions need to be effective yet approachable, especially for mid-sized companies.

Majority of Android devices vulnerable to denial-of-service bug

Majority of Android devices vulnerable to denial-of-service bug

By

Trend Micro has identified a new Android denial-of-service bug that can be exploited to make devices unresponsive and practically unusable.

Critical Android bugs can be exploited via MMS, 950M users affected

Critical Android bugs can be exploited via MMS, 950M users affected

By

Successfully exploiting the vulnerabilities could allow an attacker to spy on users, or even completely take over the device.

Fake games in Google Play redirect Android users to porn sites

Fake games in Google Play redirect Android users to porn sites

By

The threat is detected by Avast as Clicker-AR, and by requesting a certain permission it can redirect Android users to porn sites via their browser or other apps.

iPhones, jailbroken and not, vulnerable to Hacking Team spyware, firm finds

iPhones, jailbroken and not, vulnerable to Hacking Team spyware, firm finds

By

Despite reports that iOS devices must be jailbroken before compromise, researchers found other ways to install the spyware.

Popular Android games on Google Play observed stealing Facebook credentials

Popular Android games on Google Play observed stealing Facebook credentials

By

Cowboy Adventure is a working game with between 500,000 and 1,000,000 downloads, but it is also malware that has been observed stealing Facebook credentials.

Encryption hearing focuses on retaining access to users' devices

By

FBI Director James Comey brought his case against encryption to the Senate Judiciary Committee on Wednesday and said it hampers terrorism investigations.

Google pulls phony BatteryBot Pro app from Play store

Google pulls phony BatteryBot Pro app from Play store

By

The malicious third-party Android app conducts click fraud, premium rate SMS fraud and downloads additional malicious APKs.

MasterCard testing facial recognition technology to verify online purchases

By

MasterCard has announced that it will begin using facial recognition and other biometric measures to verify payments in an effort to replace passwords.

More than 440K new Android malware strains found in Q1, study finds

More than 440K new Android malware strains found in Q1, study finds

By

Mobile malware jumped 6.4 percent from Q4 2015 to Q1 2015 with half of the malware being financially motivated, a G DATA study showed.

Is the password dead? Not just yet.

Mark Twain once said, "The report of my death was an exaggeration." Can the same be said for the password?

Checkmarx receives $84M investment

By

Application security firm Checkmarx announced on Thursday it received an $84M investment from Insight Venture Partners.

Samsung devices, including Galaxy S6, vulnerable to remote code execution

Samsung devices, including Galaxy S6, vulnerable to remote code execution

By

NowSecure detailed a vulnerability in Samsung's pre-installed Swift keyboard app that leaves device owners vulnerable to remote code execution.

Moving beyond passwords with mobile

Digital Identity is the foundation for granting user access in today's connected enterprise. Dated authentication approaches fall short on both security effectiveness and user experience.

SC Congress Toronto: IBM's Lodewijkx shares company's guiding security principles

SC Congress Toronto: IBM's Lodewijkx shares company's guiding security principles

By

During the afternoon keynote at SC Congress Toronto, Lodewijkx shared IBM's guiding principles for mitigating IT security threats.

Apple to require iOS 9 users to use six-digit passwords and two-step authentication

By

Apple will require iOS 9 users to use six-digit passwords and two-factor authentication when signing into Apple services from a new device or browser.

The long and winding road: EMV adoption

The long and winding road: EMV adoption

By

Swapping out magnetic stripe payment cards for those equipped with computer chips is no small task, reports Karen Epper Hoffman.

iOS text message bug a nuisance, could have broader security implications

iOS text message bug a nuisance, could have broader security implications

By

An iOS 8 bug in the Messages app causes iPhones to crash and reboot after receiving a specific string of Arabic characters.

Help protect your organization from visual hacking: Best practices

How serious is the risk of visual hacking in your organization? Consider who may be viewing, photographing and collecting sensitive information from your offices and electronic devices when staff is mobile.

More than 30 scareware apps disguised as Minecraft cheats in Google Play

By

More than 30 apps in the Google Play store were found to be scareware posing as Minecraft cheats.

U.S. authorities investigate fraudulent Uber charges to British accounts

By

U.S. authorities are investigating claims by British Uber customers that they were charged for phantom rides in the U.S.

Extortion malware for Android, iOS rose in second half of 2014, report says

By

F-Secure observed an uptick in ransomware as well as malware for both Android and iOS in the second half of last year, according to its new threat report.

Survey highlights millennial, baby boomer habits on corporate devices

By

Sixty-four percent of millennials used their employer-owned device for personal use, compared to 37 percent of baby boomers.

Verizon Wireless, Sprint in $158M settlement with FCC over cramming

By

The Federal Communications Commission (FCC) said Verizon Wireless and Sprint would pay $90 million and $68 million respectively for billing customers for unauthorized third-party texting services charges.

Hackers exploit Starbucks auto-reload feature to steal from customers

Hackers exploit Starbucks auto-reload feature to steal from customers

By

Starbucks customers say auto-reload feature is being used to steal from their linked credit cards and bank accounts.

Mobile threats on the rise, Q1 2015 report shows

Mobile threats on the rise, Q1 2015 report shows

By

Kaspersky Lab saw 3.3 times as many new malicious mobile programs in Q1 2015 than it did in the final quarter of last year.

Koler ransomware variant targets Android users in Canada

Koler ransomware variant targets Android users in Canada

By

The threat actors set up malicious adult websites to distribute the malware, and so far infection rates are estimated to be in the thousands.

Internet security best practices from the Global 1000

The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

iPad app glitch delays 74 flights for American Airlines

By

A glitch in an iPad apps pilots use to communicate caused of 74 flight delays for American Airlines.

Forrester estimates that broad EMV chip adoption is half a decade away

Forrester estimates that broad EMV chip adoption is half a decade away

By

EMV, despite its security features over magnetic stripe cards, cannot prevent against "wholesale breaches of large numbers of credit card numbers," report authors said.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US