A team of researchers created an app vetting scanner referred to as "MassVet," and used it to identify 127,429 malicious apps on 33 Android markets.
Malware author Morgan Culbertson pleaded guilty on Tuesday in a Pittsburgh federal court.
The Recordable Activator app was available in the Google Play store and was observed exploiting the Certifi-gate vulnerability.
Symantec reported today that its security software is now protecting more than 1 billion Internet of Things (IoT) devices and as this number expands so will security risks associated with these products.
The vulnerability, which is being referred to by Appthority as Quicksand, was patched by Apple in iOS 8.4.1.
Google has addressed the bug, CVE-2015-3842, which can be exploited via a malicious app that does not require any permissions.
IT security is more challenging than ever. IT departments are tasked with managing a roaming workforce with limited resources and budget. Security solutions need to be effective yet approachable, especially for mid-sized companies.
Drivers in the Washington, D.C. metro area are being targeted by a phishing scam that purports to come from E-ZPass.
The vulnerability was identified by security researchers with MWR Labs, and it impacts Google Admin version 2014101605 and lower.
Apple's update to iOS and iTunes included dozens of security patches along with fixes for the iCloud Music Library and Apple Music.
The malware was detected by Fortinet as Android/Locker.CB!tr and is capable of receiving a variety of commands.
Mobile Devices said will soon distribute an update that will fix the security flaw in its On-Board Diagnostics II (OBD-II) dongle which was shown to allow a Corvette to be controlled through a text message.
Researchers at the University of California at San Diego have figured out how to control certain features on a car via text.
An IBM security research team has uncovered an additional flaw in Android that can give a malicious app the ability to fully control a device.
An Android vulnerability - dubbed Certifi-gate - can enable an attacker to take over practically any device running the popular mobile operating system.
Tesla Motors has already patched the flaw that allowed researchers to turn off and stop a Tesla S when it is driving at slow speed.
Square countered the claim of three Boston University graduates that its reader can be quickly and easily converted into a credit card skimmer.
The vulnerability can be exploited by either by a malicious app installed on the affected device, or by luring a user to a specially crafted website.
Trend Micro has identified a new Android denial-of-service bug that can be exploited to make devices unresponsive and practically unusable.
Successfully exploiting the vulnerabilities could allow an attacker to spy on users, or even completely take over the device.
The threat is detected by Avast as Clicker-AR, and by requesting a certain permission it can redirect Android users to porn sites via their browser or other apps.
Despite reports that iOS devices must be jailbroken before compromise, researchers found other ways to install the spyware.
Cowboy Adventure is a working game with between 500,000 and 1,000,000 downloads, but it is also malware that has been observed stealing Facebook credentials.
FBI Director James Comey brought his case against encryption to the Senate Judiciary Committee on Wednesday and said it hampers terrorism investigations.
The malicious third-party Android app conducts click fraud, premium rate SMS fraud and downloads additional malicious APKs.
MasterCard has announced that it will begin using facial recognition and other biometric measures to verify payments in an effort to replace passwords.
Mobile malware jumped 6.4 percent from Q4 2015 to Q1 2015 with half of the malware being financially motivated, a G DATA study showed.
Mark Twain once said, "The report of my death was an exaggeration." Can the same be said for the password?
Application security firm Checkmarx announced on Thursday it received an $84M investment from Insight Venture Partners.
NowSecure detailed a vulnerability in Samsung's pre-installed Swift keyboard app that leaves device owners vulnerable to remote code execution.
Sign up to our newsletters
SC Magazine Articles
- John McAfee points to lone woman as Ashley Madison attacker while company offers reward
- Zero-Day, Angler kit exploits help drive up malvertising by 325%
- Judge grants father in custody case access to ex-wife's Facebook profile
- IBM: Corporations could be the next target for ransomware attacks
- Class action complaint filed against IRS over data breach