IT security is more challenging than ever. IT departments are tasked with managing a roaming workforce with limited resources and budget. Security solutions need to be effective yet approachable, especially for mid-sized companies.
Trend Micro has identified a new Android denial-of-service bug that can be exploited to make devices unresponsive and practically unusable.
Successfully exploiting the vulnerabilities could allow an attacker to spy on users, or even completely take over the device.
The threat is detected by Avast as Clicker-AR, and by requesting a certain permission it can redirect Android users to porn sites via their browser or other apps.
Despite reports that iOS devices must be jailbroken before compromise, researchers found other ways to install the spyware.
Cowboy Adventure is a working game with between 500,000 and 1,000,000 downloads, but it is also malware that has been observed stealing Facebook credentials.
FBI Director James Comey brought his case against encryption to the Senate Judiciary Committee on Wednesday and said it hampers terrorism investigations.
The malicious third-party Android app conducts click fraud, premium rate SMS fraud and downloads additional malicious APKs.
MasterCard has announced that it will begin using facial recognition and other biometric measures to verify payments in an effort to replace passwords.
Mobile malware jumped 6.4 percent from Q4 2015 to Q1 2015 with half of the malware being financially motivated, a G DATA study showed.
Mark Twain once said, "The report of my death was an exaggeration." Can the same be said for the password?
Application security firm Checkmarx announced on Thursday it received an $84M investment from Insight Venture Partners.
NowSecure detailed a vulnerability in Samsung's pre-installed Swift keyboard app that leaves device owners vulnerable to remote code execution.
Digital Identity is the foundation for granting user access in today's connected enterprise. Dated authentication approaches fall short on both security effectiveness and user experience.
During the afternoon keynote at SC Congress Toronto, Lodewijkx shared IBM's guiding principles for mitigating IT security threats.
Apple will require iOS 9 users to use six-digit passwords and two-factor authentication when signing into Apple services from a new device or browser.
Swapping out magnetic stripe payment cards for those equipped with computer chips is no small task, reports Karen Epper Hoffman.
An iOS 8 bug in the Messages app causes iPhones to crash and reboot after receiving a specific string of Arabic characters.
How serious is the risk of visual hacking in your organization? Consider who may be viewing, photographing and collecting sensitive information from your offices and electronic devices when staff is mobile.
More than 30 apps in the Google Play store were found to be scareware posing as Minecraft cheats.
U.S. authorities are investigating claims by British Uber customers that they were charged for phantom rides in the U.S.
F-Secure observed an uptick in ransomware as well as malware for both Android and iOS in the second half of last year, according to its new threat report.
Sixty-four percent of millennials used their employer-owned device for personal use, compared to 37 percent of baby boomers.
The Federal Communications Commission (FCC) said Verizon Wireless and Sprint would pay $90 million and $68 million respectively for billing customers for unauthorized third-party texting services charges.
Starbucks customers say auto-reload feature is being used to steal from their linked credit cards and bank accounts.
Kaspersky Lab saw 3.3 times as many new malicious mobile programs in Q1 2015 than it did in the final quarter of last year.
The threat actors set up malicious adult websites to distribute the malware, and so far infection rates are estimated to be in the thousands.
The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.
A glitch in an iPad apps pilots use to communicate caused of 74 flight delays for American Airlines.
EMV, despite its security features over magnetic stripe cards, cannot prevent against "wholesale breaches of large numbers of credit card numbers," report authors said.
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- United reportedly hacked by same group that breached Anthem, OPM
- All smartwatches are vulnerable to attack, finds study
- Security concerns raised at Windows 10 roll-out
- NYU conference encourages women to pursue cybersecurity
- Modular Potao malware used to spy on targets in Ukraine, Russia
- GM says OnStar app flaw fixed, researcher says still exploitable
- TV5Monde in chaos as data breach costs roll into the millions
- Four McLean Hospital backup data tapes go missing, thousands affected