Mobile News, Articles and Updates
Researchers spotted cyber scammers and street crooks looking to take advantage of the success of the popular Pokemon app.
Los Angeles police detectives bypassed an iPhone security feature that prevents access to content on disabled phones, according to a report, citing court papers reviewed by the news daily.
A recent study found that connected cars makers may require another three years before they can properly secure this type of vehicle.
A high school student has claimed to have hacked the private email account of CIA Director John Brennan where the student found a number of sensitive, government-related files, according to a report in the New York Post.
Researchers at Secunia detected nearly 10,000 vulnerabilities in nearly 2,000 products, including Oracle Solaris and IBM i5/OS.
Researchers at Zscaler's discovered a new variant of Android ransomware disguised as a porn video player application.
A Fayetteville, N.C., teenager is facing five felony charges for possessing nude photos of himself and one sent by his girlfriend.
After a patch for the Stagefright flaw was discovered to be incomplete, leaving Android devices vulnerable to attack, Google has released a new patch to open source.
A researcher has developed an algorithm that exploits a flaw in a Facebook privacy setting to link cell phone numbers to Facebook accounts.
Choosing the right secure file transfer vendor in today's heightened security & compliance landscapeJune 17, 2015
As mobile technologies, cloud computing, and always-connected environments continue to enable fluid movement of data, organizations must consider solutions that meet both current, and future needs.
The NSA intercepted communications from hundreds of email accounts from major cell phone network operators to exploit network weaknesses for surveillance purposes.
Earlier this month, it was revealed that DOJ uses "dirtboxes" attached to aircrafts to spy on Americans' mobile devices.
Kristin Nyunt of Monterey, Calif., is charged with two counts of illegal wiretapping and possession of illegal interception devices and faces a sentence of up to five years in prison.
Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
It's more than a trend. Mobile devices are becoming the new enterprise desktop. But mobile devices require the same security considerations to access corporate intranets or securely sending and receiving email.
On Monday, the University of New Haven revealed its first video in a series of security findings.
Trend Micro found that compromised hosts, DDoS attack services and remote access trojans were the most coveted offerings in the marketplace last year.
The third annual Mobile Pwn2Own competition will feature new devices to crack and a $425,000 prize pool, which has gone up $125,000 from last year's.
Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.
BYOD improves employee satisfaction and productivity, but the fact remains that business risk increases dramatically when personal and business applications intermingle.
Anonymous confessions posted on a popular app, called "Secret," were susceptible to being exposed via a hack.
The Metropolitan Police have reportedly lobbied for two years to enact the standard.
The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.
The vulnerability comes into play when Instagram users search for Facebook friends to "follow."
An Android RAT known as Krysanec, which can take photos, record audio and steal data, is being spread through modified legitimate apps.
The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.
The mobile security vendor will use the funds to extend its security platform to the enterprises.
A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.
Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.
In this video shot at Black Hat 2014 in Las Vegas, Jeff Forristal of Bluebox Security sits with Danielle Walker, reporter at SC Magazine, to discuss the Fake ID Android vulnerability.
SC Magazine Articles
- WhatsApp in the spotlight after Turkey publishes messages of coup officers
- Trump's Russian interests and Guccifer 2.0
- WordPress Summer of Pwnage: 64 holes in 21 days
- Russian hackers take the stage at DNC convention
- Proliferation of hacker culture helped keep Anonymous from being branded terrorist org
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Microsoft warns of new, self-propagating ransomware in the wild
- Rival cyber-gang leaks private keys of Chimera ransomware
- Fear of hacking: Internet-connected cars and home security video top survey
- LastPass pushes patch for message-hijacking bug; confirms older password-stealing vulnerability
- Stampado RaaS reflective of market trends
- The Tor Project says investigation confirms Appelbaum's sexual misconduct