Mobile Security News, Articles and Updates

European smishing campaign steps up tactics, strengthens malware

European smishing campaign steps up tactics, strengthens malware

By

The actors behind a series of ongoing SMS phishing scams targeting Europe-based Android users have intensified their campaigns and significantly upgraded the credentials-stealing malware that's been infecting their victims.

Mobile Ransomware attack on the rise, report

Mobile Ransomware attack on the rise, report

By

The amount of mobile ransomware being pushed has more than doubled over the last two years as the mainly Russian cybergangs behind attacks have focused efforts on more lucrative targets in Germany, Canada and the U.K.

Autorooting malware LevelDropper detected, removed from Google Play Store

Autorooting malware LevelDropper detected, removed from Google Play Store

By

Researchers at Lookout identified a malicious app in the Google Play Store that disguises malware able to root a user's device so as to install unwanted applications.

Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks

Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks

By

A recent survey found the majority of U.S. consumers regularly engage in risky public Wi-Fi behavior and are unaware of the risks they are running.

MDM software compromises BYOD employee privacy: study

MDM software compromises BYOD employee privacy: study

By

MDM software, widely used to manage and secure employee devices in BYOD programs, compromise user privacy, according to a recent study.

FTC fines ad network for geo-tracking of millions of consumers without consent

FTC fines ad network for geo-tracking of millions of consumers without consent

By

The Federal Trade Commission (FTC) fined the InMobi ad network $950,000 for tracking the location of hundreds of millions of consumers without consent.

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

Blasphemy! Godless malware preys on nearly 90 percent of Android devices

By

Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.

Bug detected in popular chat client Pidgin

Bug detected in popular chat client Pidgin

By

A flaw opens users to the possibility of information leakage, denial of service, directory traversal and buffer overflow.

Apple reveals potential iOS security flaws in unencrypted kernel release

Apple reveals potential iOS security flaws in unencrypted kernel release

Apple has released an unencrypted version of its latest operating system for iOS 10, giving security researchers an unprecedented opportunity to scour the kernel for security flaws.

Google adds streamlined two-factor authorization

Google adds streamlined two-factor authorization

By

Google has made it easier for consumers to implement and make use of its two-factor authorization (2FA) system by adding a clickable prompt button that replaces the currently used texted six-digit code that is used to unlock an account.

Dial M for malware: 'Pawost' trojan hijacks Android phones to make unauthorized calls

Dial M for malware: 'Pawost' trojan hijacks Android phones to make unauthorized calls

By

A recently discovered mobile malware program is giving Android devices a mind of their own, causing them to use Google Talk to secretly and repeatedly place outgoing calls to mysterious phone numbers approximately every two minutes.

Gartner's top-10 list of infosec techs addresses concerns over cloud, IoT

Gartner's top-10 list of infosec techs addresses concerns over cloud, IoT

By

At the Gartner Security & Risk Management Summit outside of Washington, D.C., this week, the firm revealed its top-10 list of information security technologies that are trending in 2016.

Risky code in Vpon SDKs leaves mobile apps prone to malicious takeovers

Risky code in Vpon SDKs leaves mobile apps prone to malicious takeovers

By

Researchers at FireEye have found that certain iOS versions of the Vpon mobile ad software development kit (SKD) contain code that could allow bad actors to remotely take command of certain mobile apps.

IT pros are not sure how to properly secure their IoT devices

IT pros are not sure how to properly secure their IoT devices

While most IT professionals acknowledge the growing amount of IoT devices on their networks, they are unaware of how to properly secure them.

Vulnerability in Telegram messaging app can send data charges soaring

Vulnerability in Telegram messaging app can send data charges soaring

By

Encrypted messaging app Telegram reportedly contains an unpatched vulnerability that bad actors can exploit to send massive text messages that drive up data charges or cause mobile phones to crash.

Triada trojan now redirecting Android users to fake, malicious URLs

Triada trojan now redirecting Android users to fake, malicious URLs

By

The Android trojan "Triada," known for granting superuser privileges to other downloaded Trojans, is now embedding itself into at least four browsers in order to intercept URL requests and send users instead to malicious mobile websites, according to Kaspersky Lab.

Burned by ID thief, FTC's chief technologist urges mobile customers, carriers to bolster security

Burned by ID thief, FTC's chief technologist urges mobile customers, carriers to bolster security

By

After an unknown perpetrator impersonated her in mobile phone store, the FTC's chief technologist, Lorrie Cranor, warned mobile customers of phone and SIM card scams, and urged carriers to employ additional security measures.

Google patches 36 critical-severity and high-severity flaws

Google patches 36 critical-severity and high-severity flaws

By

Google released its June update, patching eight critical-severity vulnerabilities and 28 high-severity vulnerabilities that affect its Nexus devices and devices manufactured by partners of Google's Android Open Source Project.

Facebook Messenger flaw fixed promptly

Facebook Messenger flaw fixed promptly

By

After Check Point notified Facebook of a flaw in its Facebook Online Chat & Messenger App earlier this month, the social media giant responded and quickly fixed the vulnerability.

Survey: 85 percent of senior security pros say more than half of IoT products are not secure

Survey: 85 percent of senior security pros say more than half of IoT products are not secure

By

The proportion of executives who continue to distrust IoT as a secure technology is overwhelming, if a new survey from research-oriented security service firm IOActive is any indication.

Wireless hack could result in Mitsubishi cars being stolen

Wireless hack could result in Mitsubishi cars being stolen

The alarm can be disabled and the battery drained, researchers claim

'Trojan.Pornclicker' spotted in the Google Play store

'Trojan.Pornclicker' spotted in the Google Play store

By

Malwarebytes researchers spotted a trojan clicker in the Google Play store disguised as a Turkish application.

Lenovo advises users to remove vulnerable preinstalled app

Lenovo advises users to remove vulnerable preinstalled app

By

Lenovo advised users to remove a preloaded application after a vulnerability was spotted that could allow MitM attacks.

Marcher mobile malware adds nine UK banks to target list

Marcher mobile malware adds nine UK banks to target list

Russian banking malware, Marcher, is headed for the UK in a big way - banks and consumers are urged to be on guard.

Former DNI McConnell joins biometric firm's board

Former DNI McConnell joins biometric firm's board

By

Former U.S. Director of National Intelligence (DNI) and National Security Agency (NSA) Vice Admiral Mike McConnell joined the board of directors of Plurilock Security Solutions, a Canadian biometric cybersecurity firm.

Don't connect your charging cell to a computer or you may get hacked!

Don't connect your charging cell to a computer or you may get hacked!

Connecting your mobile device to a computer using a USB cable could make you vulnerable to hackers.

Pair of vulnerabilities in LG devices could lead to remote attacks

Pair of vulnerabilities in LG devices could lead to remote attacks

By

Check Point this weekend disclosed two vulnerabilities specifically endemic to LG mobile devices, both of which if exploited could allow a hacker to remotely attack a device. LG has already issued fixes for both issues.

Workplace security awareness programs lacking in efficacy, says study

Workplace security awareness programs lacking in efficacy, says study

By

Just because a company offers a cybersecurity training program to its employees doesn't mean it's necessarily doing enough to change workers' dangerous online behaviors, according to a report from Experian and Ponemon Institute.

Russian bank app changes password when users attempt removal

Russian bank app changes password when users attempt removal

By

Researchers discovered a Russian fake banking application that can evade detection by changing a device's password if the victim tries to remove the app.

Apple rehires crypto legend Jon Callas

Apple rehires crypto legend Jon Callas

By

Cryptology executive Jon Callas returned to Apple, following the FBI/Apple showdown this year.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US