Among 125 law enforcement agencies in 33 states, one in every four use the "tower dump" tactic, new reports reveal.
An Android vulnerability that allows a rogue app to remove all existing securities activated by a user of the popular mobile operating system was discovered by researchers in Berlin.
The agency makes use of the sweeping surveillance practice employing a sophisticated tool called "co-traveler," which essentially tracks bystanders interacting with targets.
Again, it's the time for the annual "doom and gloom" security outlook for the coming year. Understandable, when after a busy season of attacks it seems likely that next year will only bring worse.
A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.
Jay Radcliffe showed how his insulin pump was vulnerable to a remote takeover.
Don't hang your hat on enterprise app store security, says Jack Walsh at ICSA Labs.
In this month's debate, experts discuss whether the biometrics on Apple's iPhone 5s will evolve the security of personal devices.
Among the top five concerns were source code leaks, which will make malware threats all the more pervasive, an anti-fraud firm found.
Finding ways to bypass or validate digital signatures on PCs and Android-based mobile devices in an attempt to distribute malware is fast becoming a new trend among attackers.
Apple released iOS 7.0.4 to address some bugs and also released a developer version of iOS 7.1, which will tackle other issues and add some new features.
Two teams have accepted rewards for demonstrating exploits against cell phones in the Mobile Pwn2Own 2013 contest sponsored by HP.
Researchers with the University of Cambridge revealed just how effective PIN Skimmers can be against mobile devices in a recently released study on the new type of side-channel attack.
A Utah university found a solution to enable secure access to the campus network - while cutting down on help desk calls, reports Greg Masters.
While already ubiquitous in much of the world, mobile payment options are gaining traction in the United States, reports Stephen Lawton.
A recent report notes that 23 percent of free Google Play apps contain "madware," overly aggressive mobile adware.
Researchers have determined that a vulnerability, known as HTTP Request Hijacking, can be exploited in several iOS apps.
Until he presents at a November conference, a 17-year-old researcher told Mozilla that he will not reveal any of the technical secrets behind a piece of malware he wrote for mobile Firefox OS.
In the wake of Apple announcing new iPads, Macbooks and Mac Pros, users may have overlooked that this week the technology giant also pushed out iOS 7.0.3 for mobile devices.
Security company Quarkslab concluded that Apple's popular iMessage instant messaging system is vulnerable to decryption via man-in-the-middle attacks.
Shantanu Gawde, a 17-year-old security researcher, has become the first person to infect the newly released mobile Firefox OS with malware.
It's surprisingly easy for an attacker to set up a rogue wireless access point with open access and perform a MiTM attack, gaining access to a wealth of sensitive information.
While at a Gartner conference this week, Google Executive Chairman Eric Schmidt defended the security of Android devices.
By early 2014, the alliance plans to release an open standard that would shrink users' dependency on password and PIN authentication.
Canadian mobile company BlackBerry has realigned its business to refocus on enterprise customers after losing almost a billion dollars in a single quarter.
Berlin-based Security Research Labs made a video showing how the newly released iPhone 5s is the "most vulnerable" mobile device yet.
Siri was designed to be an effective personal assistant, but since the release of iOS 7, the artificial intelligence is bringing the bad with the good.
A flaw that allowed users to break through the passcode screen was eliminated in iOS 7.0.2.
It took less than 48 hours for a European hacker association known as Chaos Computer Club (CCC) to become the first group to bypass Apple's Touch ID.
A user discovered an easy way to bypass Apple's iOS 7 lock screen, making it the first significant flaw uncovered since the new operating system launched on Wednesday.