The hotel chain has addressed a weakness in its Marriott International Android app that could have allowed attackers to access customer data, including credit card information.
The app is no longer available from the Google Play store, but prior to being removed it had been installed between 50,000 and 100,000 times.
Apps were flagged for containing malware or suspicious binaries, a RiskIQ study found.
Verizon has fixed a critical vulnerability in its My FiOS app that made it possible to read and send messages from any Verizon user's email account.
Mobile security company Lookout released its annual Mobile Threat Report on Thursday, which demonstrated a major uptick in Android malware encounters.
Manhattan District Attorney Cyrus Vance said in a speech earlier this week that he thinks device-makers should be required to give law enforcement access to their users' data.
SnoopSnitch requires a rooted device with a Qualcomm chipset that runs stock Android 4.1 or higher.
On Thursday, Netskope released a report analyzing risky app usage in enterprise environments.
Two senators wrote a letter requesting more information about stingray use and the FBI's policies surrounding the devices.
The malware, dubbed "Badaccents," targets Android users in South Korea and has infected as many as 20,000 devices.
Vulnerabilities in Signaling System 7 make it possible for anyone to listen in on phone calls and read text messages, even if encrypted.
Palo Alto Networks Unit 42 researchers have identified the backdoor on numerous devices, so far leaving more than 10 million users vulnerable.
2015 is setup to be one of the most dangerous years for not only your PC but also your mobile devices and cloud storage.
Back in October, the Chinese iOS trojan was discovered by Lacoon Mobile Security.
As we all gear up for the holidays with plans to purchase any number of items online, cyberthieves too are gearing up with more and more creative ways to steal money, credentials and critical data from any number of organizations.
WireLurker illuminates that mobile applications expand the perimeter to include new risks that may be neglected.
Encrypted communications between a Samsung smartwatch and Android device were easily cracked by Bitdefender researchers.
Mobile Devices has seen unprecedented growth since their introduction and now form an integral part of our daily lives. Yet, many Enterprises have not fully embraced mobile as part of their strategy because of too many unanswered questions.
New Cloudmark research shows that bank and account phishing has become the top SMS attack in the U.S. in recent months.
Hammad Akbar, the CEO of companies that sold and advertised mobile spyware app StealthGenie, will pay the fine in what's considered a landmark criminal conviction.
A researcher at Symantec traced DroidJack's origins back to legitimate Android app developers and previous RATs.
Security firm Zimperium detected attacks in the wild over the past six to eight months.
Mobile security firm Lookout detailed how the malware has grown in complexity to hide its botnet activity.
More and more corporate activities are being undertaken by employees depending on iPhones, iPads, laptops and other mobile devices.
The U.S. Department of Justice is attaching small devices to airplanes that gather massive amounts of mobile phone data, including the data of innocent Americans, a Wall Street Journal report indicates.
One-time passwords (OTPs) sent via SMS are increasingly the target of Android malware, the report by Javelin revealed.
American Express Token Service is based on a technical framework developed by EMVCo.
There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.
The tool, called "notogotofail," tests whether devices and applications are secured against known TLS/SSL flaws and misconfigurations.
Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
Sign up to our newsletters
SC Magazine Articles
- Don't dismiss internal data breaches as minor - they aren't!
- Firm finds link between Regin spy tool and QWERTY keylogger
- Insider threats changing security spending, report says
- New attack uses ransomware to drop trojans and keyloggers
- Size and frequency of DDoS attacks increasing, annual report shows