Mobile Security News, Articles and Updates
A system integrity feature that prohibits Android mobile devices from booting when the presence of malware is suspected will now be strictly enforced in version 7.0.
Apple patches critical vulnerabilities in iOS and OS X that could allow remote code execution.
The number of unique malware families found actively attacking business networks grew 61 percent from January 2016 to June, with 2,420 distinct threats detected last month, according to Check Point Software Technologies' June Threat Index.
Duo Labs researchers said Nexus devices ship with a "purer flavor of Android" and are consistently in the first wave of Androids to receive operating system updates.
Hidden voice commands embedded in a YouTube video can trigger mobile devices to download malware and alter configuration settings.
Vulnerability Lab researchers reportedly spotted two upatched bugs in BMW domains and its ConnectedDrive portal.
Researchers have proven that sensors in wearable electronics can be exploited to measure minute movements in users' arms in an effort to decipher keystrokes and PIN codes that they enter into computers and ATMs.
Google releases Android security bulletin, providing updates for 89 critical and high severity vulnerabilities affecting software and hardware components including Mediaserver, OpenSSL, BoringSSL, Bluetooth, Qualcomm, and numerous drivers.
A criminal division of an otherwise legitimate Chinese tech company is behind a mobile malware distribution campaign that currently generates around $300,000 a month, according to a Check Point threat analysis.
Google will include a new defensive measure in its upcoming Android 7.0, or Nougat, operating system that will block ransomware designed to lock the device's display.
A security researcher looks to have discovered an Achilles heel in the way millions of Android phones execute encryption, leaving these mobile devices potentially vulnerable to advanced hacking techniques.
The actors behind a series of ongoing SMS phishing scams targeting Europe-based Android users have intensified their campaigns and significantly upgraded the credentials-stealing malware that's been infecting their victims.
The amount of mobile ransomware being pushed has more than doubled over the last two years as the mainly Russian cybergangs behind attacks have focused efforts on more lucrative targets in Germany, Canada and the U.K.
Researchers at Lookout identified a malicious app in the Google Play Store that disguises malware able to root a user's device so as to install unwanted applications.
A recent survey found the majority of U.S. consumers regularly engage in risky public Wi-Fi behavior and are unaware of the risks they are running.
MDM software, widely used to manage and secure employee devices in BYOD programs, compromise user privacy, according to a recent study.
The Federal Trade Commission (FTC) fined the InMobi ad network $950,000 for tracking the location of hundreds of millions of consumers without consent.
Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.
A flaw opens users to the possibility of information leakage, denial of service, directory traversal and buffer overflow.
Apple has released an unencrypted version of its latest operating system for iOS 10, giving security researchers an unprecedented opportunity to scour the kernel for security flaws.
Google has made it easier for consumers to implement and make use of its two-factor authorization (2FA) system by adding a clickable prompt button that replaces the currently used texted six-digit code that is used to unlock an account.
A recently discovered mobile malware program is giving Android devices a mind of their own, causing them to use Google Talk to secretly and repeatedly place outgoing calls to mysterious phone numbers approximately every two minutes.
At the Gartner Security & Risk Management Summit outside of Washington, D.C., this week, the firm revealed its top-10 list of information security technologies that are trending in 2016.
Researchers at FireEye have found that certain iOS versions of the Vpon mobile ad software development kit (SKD) contain code that could allow bad actors to remotely take command of certain mobile apps.
While most IT professionals acknowledge the growing amount of IoT devices on their networks, they are unaware of how to properly secure them.
Encrypted messaging app Telegram reportedly contains an unpatched vulnerability that bad actors can exploit to send massive text messages that drive up data charges or cause mobile phones to crash.
The Android trojan "Triada," known for granting superuser privileges to other downloaded Trojans, is now embedding itself into at least four browsers in order to intercept URL requests and send users instead to malicious mobile websites, according to Kaspersky Lab.
After an unknown perpetrator impersonated her in mobile phone store, the FTC's chief technologist, Lorrie Cranor, warned mobile customers of phone and SIM card scams, and urged carriers to employ additional security measures.
Google released its June update, patching eight critical-severity vulnerabilities and 28 high-severity vulnerabilities that affect its Nexus devices and devices manufactured by partners of Google's Android Open Source Project.
After Check Point notified Facebook of a flaw in its Facebook Online Chat & Messenger App earlier this month, the social media giant responded and quickly fixed the vulnerability.
SC Magazine Articles
- Cerber ransomware strain now targeting Office 365 users
- Critical infrastructure in Europe exposed to hackers
- Deal with the devil: Ransomware experiment proves you can negotiate price down
- WordPress Summer of Pwnage: 64 holes in 21 days
- Cerber ransomware C&C server shut down by research firm and CERT-Netherlands
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Ransomware attack almost sends NASCAR team to the garage