Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.
BYOD improves employee satisfaction and productivity, but the fact remains that business risk increases dramatically when personal and business applications intermingle.
Anonymous confessions posted on a popular app, called "Secret," were susceptible to being exposed via a hack.
The Metropolitan Police have reportedly lobbied for two years to enact the standard.
The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.
The vulnerability comes into play when Instagram users search for Facebook friends to "follow."
An Android RAT known as Krysanec, which can take photos, record audio and steal data, is being spread through modified legitimate apps.
The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.
The mobile security vendor will use the funds to extend its security platform to the enterprises.
A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.
Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.
In this video shot at Black Hat 2014 in Las Vegas, Jeff Forristal of Bluebox Security sits with Danielle Walker, reporter at SC Magazine, to discuss the Fake ID Android vulnerability.
Users were lured by phishing emails, which supposedly contained a free Kaspersky mobile security app.
The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social media? Mobile devices.
The mobile malware is currently targeting German users, McAfee revealed.
On Tuesday it was announced that the phonemaker would purchase the voice and data encryption firm.
Two researchers wrote about the Instagram app for iOS and Android is vulnerable to session hijacking because both send unsecured information through HTTP.
In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.
Researchers with Bluebox, who uncovered the vulnerability, dubbed it "Fake ID" because it enables the identity of trusted applications to be copied.
Rishab Verma and his company agreed to settle charges filed by the FTC that Verma sent millions of spam text messages that deceitfully promised free merchandise.
Android/Simplocker ransomware now encrypts archive files, asks to be installed as a Device Administrator, and delivers an English-language ransom message.
Indictments unsealed in the Northern District of Georgia on Monday charge members of three separate Android app piracy groups.
Apple responded to a Chinese television broadcasters allegations that the company is storing users information through its location tracking services.
Emails and user credentials can be stolen in a man-in-the-middle attack because the Gmail iOS app does not perform certificate pinning.
After purchasing 20 "wiped" Android smartphones on eBay, AVAST researchers were able to restore photos and other personal information.
The HijackRAT for Android mobile devices is capable of numerous attacks, such as pilfering banking information and disabling anti-virus apps.
The serious buffer overflow vulnerability affects Android 4.3, or devices running Jelly Bean.
A recently released jailbreaking tool for iOS 7.1 could be used by attackers to compromise iPhones and iPads, mobile researchers found.
The discovery of "Selmite" comes two months after the appearance of "Samsapo," believed to be the first Android worm in the wild.
Privacy advocates say the Wednesday ruling will have a positive impact on forthcoming cases involving data security.