The permissions issue could allow a malicious app to alter legitimate home screen icons.
Rogue Android apps can steal authentication tokens and risk the accounts of some of the most widely used services, including Google, Facebook and Twitter.
A more remote and mobile workforce is helping companies to reduce costs and improve employee productivity and collaboration, but organizations are at risk of losing control of their data.
Added security and no longer having to memorize increasingly difficult passwords are some of the benefits resident members of Singapore's NTUC will get by activating their new OneKey two-factor authentication devices.
A bug demonstrated by a YouTube user on Wednesday may enable a thief to delete an iCloud account, disable Find My iPhone, and ultimately restore the device, without the need of a password.
Five phony Google apps appeared in the app store, each with a $1.99 price tag, before being removed by the company.
With the addition of 15,000 mobile devices accessing its network, a medical center found assurance - and met compliance mandates, reports Greg Masters.
A researcher at Black Hat Asia highlighted security issues affecting Tesla Model S cars.
Researchers have discovered a new attack, known as Cross-Device Scripting, that can allow an attacker to compromise most smartphones by injecting malicious code through HTML5-based apps.
The companies were accused of failing to securely transmit credit card data, Social Security numbers, and other sensitive data collected by their mobile apps.
Technology enthusiasts and architects are developing networking platforms, applications and services with geo-fencing at their core.
Under the right conditions, simply updating any Android device can enable an attacker to escalate app privileges and carry out all sorts of malicious things.
A new multipurpose bot known as Zorenium has recently been updated to work with iOS devices, according to the alleged author.
Two Florida men face jail time after pleading guilty to criminal charges related to illegally distributing copyrighted Android mobile device apps.
The average consumer has 40 or more apps installed on their mobile device, many of which they use to do their jobs, whether IT has sanctioned its use or not. The problem is that creates a "shadow IT" system.
As mobile devices continue to infiltrate organizations, the demand for secure solutions becomes critical.
A new tool aimed at helping app developers create short-form privacy policies launched this past week, and the source code is available on Github.
A security researcher published a white paper on Wednesday that breaks down exactly how the Early Random PRNG, which protects mobile operating systems from kernel exploits, is vulnerable to brute force.
A Dutch researcher published a proof of concept on Tuesday that shows how a malicious application can be used to steal WhatsApp conversations on Android devices.
Nineteen bugs in web browser engine Webkit were addressed with the update.
Android users are tricked into installing a spurious "security" app, which allows fraudsters to bypass one-time password authentication for online banking.
Google quickly removed the malware, which was reportedly disguised as a legitimate parental control app, from its marketplace.
A new HTTPS remote administration tool for Android-based mobile devices has been discovered for sale on underground marketplaces, according to Symantec security researchers.
Researchers from North Carolina State University have created a tool that uses anomaly detection to distinguish authentic Android applications from those containing root exploit malware.
The most prevalent threat vector that drives mobile device users to malware are web ads, according to a recent study by Blue Coat.
Has mobile malware changed through time as dramatically as the headlines might imply?
Cloud computing is becoming a reality that will need to be addressed by every security department.
A spoofing scam uses real Verizon Wireless tech support number on phone's call ID to trick customers into divulging personal information.
Yair Amit, CTO of Skycure, discusses his company's recent discover of an iOS vulnerability that allows for concealed mobile attack and demonstrates an example of the hack.
Jeff Forristal demonstrated the hack during a session on "predatory hacking of mobile devices."