Kristin Nyunt of Monterey, Calif., is charged with two counts of illegal wiretapping and possession of illegal interception devices and faces a sentence of up to five years in prison.
Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
It's more than a trend. Mobile devices are becoming the new enterprise desktop. But mobile devices require the same security considerations to access corporate intranets or securely sending and receiving email.
On Monday, the University of New Haven revealed its first video in a series of security findings.
Trend Micro found that compromised hosts, DDoS attack services and remote access trojans were the most coveted offerings in the marketplace last year.
The third annual Mobile Pwn2Own competition will feature new devices to crack and a $425,000 prize pool, which has gone up $125,000 from last year's.
Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.
BYOD improves employee satisfaction and productivity, but the fact remains that business risk increases dramatically when personal and business applications intermingle.
Anonymous confessions posted on a popular app, called "Secret," were susceptible to being exposed via a hack.
The Metropolitan Police have reportedly lobbied for two years to enact the standard.
The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.
The vulnerability comes into play when Instagram users search for Facebook friends to "follow."
An Android RAT known as Krysanec, which can take photos, record audio and steal data, is being spread through modified legitimate apps.
The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.
The mobile security vendor will use the funds to extend its security platform to the enterprises.
A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.
Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.
In this video shot at Black Hat 2014 in Las Vegas, Jeff Forristal of Bluebox Security sits with Danielle Walker, reporter at SC Magazine, to discuss the Fake ID Android vulnerability.
Users were lured by phishing emails, which supposedly contained a free Kaspersky mobile security app.
The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social media? Mobile devices.
The mobile malware is currently targeting German users, McAfee revealed.
On Tuesday it was announced that the phonemaker would purchase the voice and data encryption firm.
Two researchers wrote about the Instagram app for iOS and Android is vulnerable to session hijacking because both send unsecured information through HTTP.
In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.
Researchers with Bluebox, who uncovered the vulnerability, dubbed it "Fake ID" because it enables the identity of trusted applications to be copied.
Rishab Verma and his company agreed to settle charges filed by the FTC that Verma sent millions of spam text messages that deceitfully promised free merchandise.
Android/Simplocker ransomware now encrypts archive files, asks to be installed as a Device Administrator, and delivers an English-language ransom message.
Indictments unsealed in the Northern District of Georgia on Monday charge members of three separate Android app piracy groups.
Apple responded to a Chinese television broadcasters allegations that the company is storing users information through its location tracking services.
Emails and user credentials can be stolen in a man-in-the-middle attack because the Gmail iOS app does not perform certificate pinning.