Mobile Security News, Articles and Updates

Zerodium offering $1.5 million for a Apple iOS 10 remote jailbreak

Zerodium offering $1.5 million for a Apple iOS 10 remote jailbreak

By

The security firm Zerodium announced an increase in bounty prices for zero-day exploits with the top prize now being $1.5 million for and Apple iOS 10 remote jailbreak, a $1 million increase.

End-of-support devices on networks weakening cyberdefenses, report

End-of-support devices on networks weakening cyberdefenses, report

By

Nearly three-quarters of businesses have end-of-support devices operating in their networks, and the consequences could prove dire, a new study found.

FBI investigating hacked mobile phones of Democratic officials

FBI investigating hacked mobile phones of Democratic officials

By

The Federal Bureau of Investigation launched an investigation into hacked mobile phones of Democratic Party officials.

Pippa Middleton's iCloud account hacked

Pippa Middleton's iCloud account hacked

A man who allegedly hacked into the iCloud account of Pippa Middleton, sister of the Duchess of Cambridge, has been arrested.

Forensics firm says iOS 10 skips certain security authentications

Forensics firm says iOS 10 skips certain security authentications

By

A Russian mobile forensics company says the iPhone's most recent operating system has weaker password protection for manual iTunes backups than earlier operating systems.

Malicious apps leveraging top UK brands has increased by 130%

Malicious apps leveraging top UK brands has increased by 130%

The number of malicious apps leveraging top UK brands has grown by 130 percent year on year.

Can one CISO ever beat an army of IoT devices?

Can one CISO ever beat an army of IoT devices?

The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.

U.S. judge will release records of surveillance device usage

U.S. judge will release records of surveillance device usage

By

A federal district judge for the District of Columbia ruled on Friday that the court would begin publishing information about federal prosecutors' use of pen registers and trap and trace devices.

Leaked Stingray documents reveal features and ease of use

Leaked Stingray documents reveal features and ease of use

By

Using mass surveillance software without a warrant is almost as easy as installing Skype.

Paper: Only 200K mobile bots needed to impair U.S. 911 system with DDoS attack

Paper: Only 200K mobile bots needed to impair U.S. 911 system with DDoS attack

By

A few as 200,000 mobile bots would be enough to launch a successful DDoS attack against the U.S.' 911 infrastructure, significantly disrupting service nationwide, a new research paper from Ben-Gurion University reports.

Pokemon Go scammers turn to social media and imitation apps

Pokemon Go scammers turn to social media and imitation apps

By

The popularity of Pokémon Go is continuing to attract scammers looking to exploit users in search of a leg up in the game.

Google patches 57 Android vulnerabilities, attempts to resolve Mediaserver attacks

Google patches 57 Android vulnerabilities, attempts to resolve Mediaserver attacks

By

Google has released patches for 57 security vulnerabilities affecting Android devices. Eight of the flaws were issued a "critical" rating.

Linux rootkit, named for Pokémon's Umbreon, targets Linux

Linux rootkit, named for Pokémon's Umbreon, targets Linux

By

Researchers at Trend Micro have detected a new rootkit family that is going after Linux systems.

Gugi mobile banking malware reportedly tweaked to defeat Android 6 security permissions

Gugi mobile banking malware reportedly tweaked to defeat Android 6 security permissions

By

The developers of the mobile banking trojan Gugi have introduced new modifications to sidestep two key security features of Android, reports Kaspersky Lab researcher Roman Unuchek via the Securelist blog.

Bilal Bot malware author carries marketing efforts to mainstream press

Bilal Bot malware author carries marketing efforts to mainstream press

By

An IBM researcher received a followup email from a person allegedly behind the creation of an Android malware app seeking redress to clarify some details.

40 apps containing DressCode malware family found on Google Play

40 apps containing DressCode malware family found on Google Play

By

Researchers discovered 40 applications in the Google Play store that contain a new family of malware, dubbed DressCode.

Survey: Hackers believe strongly in privacy... unless they're paid to crack passwords

Survey: Hackers believe strongly in privacy... unless they're paid to crack passwords

By

Four out of five surveyed hackers agreed that Apple was right to refuse the FBI's request for a backdoor into the San Bernardino shooter's iPhone. Yet 52 percent said they would help the FBI crack an iPhone's password for a fee.

Apple issues updates to prevent spying on desktop

Apple issues updates to prevent spying on desktop

By

Last week, Apple issued security updates to patch a serious flaw affecting iPhone and iPad users. Yesterday it addressed a similar flaw on its desktops.

Flagrant foul? Mobile app user accuses NBA's Warriors of spying on conversations

Flagrant foul? Mobile app user accuses NBA's Warriors of spying on conversations

By

A New York woman has filed a class-action lawsuit against the Golden State Warriors, accusing the NBA franchise of distributing a mobile content app that invades users' privacy by turning on a device's microphone and eavesdropping on the audio it picks up.

Opera resets all user passwords following incursion

Opera resets all user passwords following incursion

By

Opera is alerting customers of its web browser that its sync system was breached.

Sony enables two-factor authentication for PlayStation

Sony enables two-factor authentication for PlayStation

By

In a tweet sent out at after midnight on Wednesday night, Sony announced it was enabling two-factor authentication for its PlayStation Network.

Researchers find seven classes of vulnerabilities in iOS sandbox security feature

Researchers find seven classes of vulnerabilities in iOS sandbox security feature

By

Researchers across three universities have discovered seven classes of vulnerabilities in the sandboxing feature of Apple's iOS operating system.

Lost devices leading cause of data breaches, report

Lost devices leading cause of data breaches, report

By

Phishing scams and ransomware attacks may be grabbing the headlines, but for the financial sector lost or stolen mobile devices were the leading cause of data breaches over the last decade.

Twitoor first Android malware known to leverage Twitter for command and control

Twitoor first Android malware known to leverage Twitter for command and control

By

Researchers have found the first known Android mobile malware to use a Twitter account, rather than a traditional command-and-control server, to control infected devices.

DroidJack attacks delivered through Twilio SMS messages

DroidJack attacks delivered through Twilio SMS messages

By

Researchers discovered DroidJack attacks that delivered the remote access Trojan (RAT) through an "over the top" (OTT) carrier.

Marcher steps up game: Malware poses as security update, imitates popular apps

Marcher steps up game: Malware poses as security update, imitates popular apps

By

Looking to capitalize on mobile device owners' growing security fears, a new variant of the Android malware Marcher is infecting victims by fraudulently posing as a firmware security update.

Blackberry patch fixes QuadRooter vulnerability

Blackberry patch fixes QuadRooter vulnerability

By

Blackberry is pushing out a patch today that will make users of its PRIV and DTEK50 smartphone safe from QuadRooter, a vulnerability potentially impacting the 900 million devices in use powered by a Qualcomm processor.

New Zeus Sphinx banking trojan hitting Brazil

New Zeus Sphinx banking trojan hitting Brazil

By

Capitalizing on Olympics activity, a new version of Zeus Sphinx has been targeting banks in Brazil and Colombia.

Google's Duo enters video calling market, offers end-to-end encryption

Google's Duo enters video calling market, offers end-to-end encryption

By

Google launched a video-calling app, Duo, to go up against Apple's FaceTime, Facebook's Messenger, Skype and other apps for video conversations.

Android malvertising campaign discovered delivering Svpeng Trojan through AdSense

Android malvertising campaign discovered delivering Svpeng Trojan through AdSense

By

Researchers discovered a campaign that delivers a malicious banking Trojan to Android devices using Google AdSense advertisements.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US