Attackers use phishing emails, which include links to a fake Adobe Flash update, to lure victims into installing the Stels trojan.
New clues turned up by researchers at the University of Toronto show that an Android malware spy campaign appears to be the work of Chinese hackers, possibly with the assistance of the nation's government or a major corporation.
April 01, 2013
The ever-increasing use of personal devices has tested enterprise defenses, so plans must be created to meet the challenge, reports James Hale.
April 01, 2013
Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.
In a matter of weeks, an Arizona federal judge is expected to decide whether the FBI illegally caught an accused fraudster.
March 26, 2013
Attached as a malicious APK file in a spear phishing email, once installed, the program siphons data that includes contacts, call logs, SMS messages, and more.
March 25, 2013
Officials at the University of Mississippi Medical Center posted an online notice, saying they had "insufficient contact information" to individually notify those potentially compromised.
IT departments with a block BYOD policy should be wary of these common workaround attempts or hacks.
Apple ID and iCloud users will now have the option to use the security feature for purchases or account changes.
Known for creating an undeterred web surfing experience and bolstering privacy, Google has decided to remove AdBlock Plus from its Android market place.
March 12, 2013
The results of a recent report indicate that apps on the iOS mobile platform access more information on a device than Android.
Defendants are charged with inundating consumers with texts promising "free" gift cards - and running sites that profited off the scam.
Tony Ball, senior vice president of identity and access management at HID Global, goes InFocus during the RSA Conference 2013 in San Francisco.
The mobile apps we download have access to an enormous amount of personal data. As we start using our phones and tablets for work, we're also putting corporate data at risk.
The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
February 26, 2013
Remotium won for its technology that runs mobile applications on public or private clouds so end-users aren't required to store corporate data on their devices.
Ten start-up companies will compete Monday in the "Innovation Sandbox" competition at the annual security conference.
It's an interesting time for information security professionals to converge on the City by the Bay for the 22nd annual RSA Conference. Major corporations everywhere are reeling from breaches, and the threat of foreign attacks has never been more pronounced.
The consumer protection agency said vulnerabilities and the "insecure implementation" of diagnostic software propelled action against the American division of the mobile device maker for a number of security shortfalls.
Our relationship with our devices is deep, and getting deeper. But without access to data, the value of our devices is limited, if not eliminated.
In order to implement effective mobile security, security evangelists must balance risk and cost and speak the language of business.
In the PC world, attackers prefer to compromise legitimate sites to spread malware. But in the realm of mobile, pornographic sites are the preferred launching pad for viruses.
February 07, 2013
As the bring-your-own-device movement becomes commonplace and better managed, it's time for security pros to move their focus toward securing the mobile application.
Path, a company that operates a virtual journal application for iOS and Android devices, agreed to pay the FTC $800,000.
February 01, 2013
This phenomenon sees applications designed for consumers - such as Dropbox, Skype, Google Apps, WordPress, GoToMyPC - finding their way into the corporate tool box.
This month's news briefs include bits on Android, spammers, breach penalties, crime networks, hacktivism and more.
February 01, 2013
A more substantial enterprise mobility framework can be conceived with a combination of NAC, MDM and MAM based on organizational requirements.
February 01, 2013
The NBA's New Orleans Hornets needed to provide its off-the-court, but highly mobile staff with a secure method for communicating. It found an enterprise remote access solution that could help.