Mobile

High school student reportedly hacks CIA director's personal email

High school student reportedly hacks CIA director's personal email

By

A high school student has claimed to have hacked the private email account of CIA Director John Brennan where the student found a number of sensitive, government-related files, according to a report in the New York Post.

10K vulnerabilities in nearly 2K products, report says

10K vulnerabilities in nearly 2K products, report says

By

Researchers at Secunia detected nearly 10,000 vulnerabilities in nearly 2,000 products, including Oracle Solaris and IBM i5/OS.

Researchers find ransomware disguised as porn video player

Researchers find ransomware disguised as porn video player

By

Researchers at Zscaler's discovered a new variant of Android ransomware disguised as a porn video player application.

Fayetteville, N.C., teen faces five felony charges for sexting

Fayetteville, N.C., teen faces five felony charges for sexting

By

A Fayetteville, N.C., teenager is facing five felony charges for possessing nude photos of himself and one sent by his girlfriend.

Even after patch, Stagefright poses threat to Android devices

By

After a patch for the Stagefright flaw was discovered to be incomplete, leaving Android devices vulnerable to attack, Google has released a new patch to open source.

Researcher generates thousands of phone numbers, matches them to Facebook accounts

Researcher generates thousands of phone numbers, matches them to Facebook accounts

By

A researcher has developed an algorithm that exploits a flaw in a Facebook privacy setting to link cell phone numbers to Facebook accounts.

Choosing the right secure file transfer vendor in today's heightened security & compliance landscape

As mobile technologies, cloud computing, and always-connected environments continue to enable fluid movement of data, organizations must consider solutions that meet both current, and future needs.

Report: NSA operation to identify cell phone network weaknesses, exploit for surveillance

By

The NSA intercepted communications from hundreds of email accounts from major cell phone network operators to exploit network weaknesses for surveillance purposes.

ACLU requests info on gov't spy program using 'dirtboxes'

By

Earlier this month, it was revealed that DOJ uses "dirtboxes" attached to aircrafts to spy on Americans' mobile devices.

Woman charged with using spyware on former cop

By

Kristin Nyunt of Monterey, Calif., is charged with two counts of illegal wiretapping and possession of illegal interception devices and faces a sentence of up to five years in prison.

Addressing attacks on critical infrastructure

Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.

Mobile-derived credentials

It's more than a trend. Mobile devices are becoming the new enterprise desktop. But mobile devices require the same security considerations to access corporate intranets or securely sending and receiving email.

Researchers reveal security issues in Android apps

By

On Monday, the University of New Haven revealed its first video in a series of security findings.

Report: China's underground activity doubled last year

Report: China's underground activity doubled last year

By

Trend Micro found that compromised hosts, DDoS attack services and remote access trojans were the most coveted offerings in the marketplace last year.

Researchers will compete to win up to $425,000 at Mobile Pwn2Own 2014

By

The third annual Mobile Pwn2Own competition will feature new devices to crack and a $425,000 prize pool, which has gone up $125,000 from last year's.

Calif. passes law requiring smartphone kill switch technology

By

Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.

Are Angry Birds flying away with your corporate data?

Are Angry Birds flying away with your corporate data?

BYOD improves employee satisfaction and productivity, but the fact remains that business risk increases dramatically when personal and business applications intermingle.

Hack exposes Secret app confessions

By

Anonymous confessions posted on a popular app, called "Secret," were susceptible to being exposed via a hack.

Report: UK police push for required mobile phone PWs

By

The Metropolitan Police have reportedly lobbied for two years to enact the standard.

FireEye examines popular Google Play apps, 68 percent have SSL flaws

FireEye examines popular Google Play apps, 68 percent have SSL flaws

By

The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.

Bug in iOS Instagram app fixed, impacts Facebook accounts

By

The vulnerability comes into play when Instagram users search for Facebook friends to "follow."

Android RAT spreading through modified legitimate apps

By

An Android RAT known as Krysanec, which can take photos, record audio and steal data, is being spread through modified legitimate apps.

FCC creates task force to scrutinize illegal stingray use

FCC creates task force to scrutinize illegal stingray use

By

The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.

Lookout raises $150 million in financing

By

The mobile security vendor will use the funds to extend its security platform to the enterprises.

Security movement urges automakers to collaborate with researchers

Security movement urges automakers to collaborate with researchers

By

A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

By

Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.

Analyzing the 'Fake ID' Android vulnerability

By

In this video shot at Black Hat 2014 in Las Vegas, Jeff Forristal of Bluebox Security sits with Danielle Walker, reporter at SC Magazine, to discuss the Fake ID Android vulnerability.

Android malware SandroRAT disguised as mobile security app

By

Users were lured by phishing emails, which supposedly contained a free Kaspersky mobile security app.

Mobile devices are the new endpoints...and both need protecting

Mobile devices are the new endpoints...and both need protecting

By

The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social media? Mobile devices.

Android malware spreads via mail tracking SMS spam

By

The mobile malware is currently targeting German users, McAfee revealed.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US