Mobile Devices has seen unprecedented growth since their introduction and now form an integral part of our daily lives. Yet, many Enterprises have not fully embraced mobile as part of their strategy because of too many unanswered questions.
A researcher at Symantec traced DroidJack's origins back to legitimate Android app developers and previous RATs.
Security firm Zimperium detected attacks in the wild over the past six to eight months.
Mobile security firm Lookout detailed how the malware has grown in complexity to hide its botnet activity.
More and more corporate activities are being undertaken by employees depending on iPhones, iPads, laptops and other mobile devices.
The U.S. Department of Justice is attaching small devices to airplanes that gather massive amounts of mobile phone data, including the data of innocent Americans, a Wall Street Journal report indicates.
One-time passwords (OTPs) sent via SMS are increasingly the target of Android malware, the report by Javelin revealed.
American Express Token Service is based on a technical framework developed by EMVCo.
There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.
The tool, called "notogotofail," tests whether devices and applications are secured against known TLS/SSL flaws and misconfigurations.
Modern mobile hacks are diverse and can be performed by anyone, from an inexperienced amateur to highly skilled teams operating like tech startups.
Apple's iPhone 6 and iOS 8 offer encryption for mobile users, but a focus on consumers can create security conundrums, reports Lee Sustar.
When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.
Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
As mobile devices are further integrated into networks, organizations will have a critical need to implement end-to-end security solutions.
Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.
As malware doubles on mobile devices and mobility poses a greater risk, virtualization is about protecting data at the source rather than on the device.
A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.
A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.
The settlement marks the largest FCC enforcement action to date, and also involved the FTC and state attorneys general.
The FCC launched an investigation last year after a consumer complained of the practice.
The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.
Hammad Akbar created StealthGenie, which allowed the purchaser to secretly monitor a cell phone's communications.
Hardware makers and solutions providers seek to find the right formula for protecting devices - and data, reports Alan Earls.
New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.
It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.
The update comes soon after the company released iOS 8.0.1, which caused issues for iPhone 6 and iPhone 6 Plus users.
James Comey reportedly said the developments could put consumers "beyond the law."
The update was issued only a week ago, and has now been yanked by the tech giant.
Little progress was made security wise, between the iPhone 5S and iPhone 6 sensor, a researcher found.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards