Nineteen bugs in web browser engine Webkit were addressed with the update.
Android users are tricked into installing a spurious "security" app, which allows fraudsters to bypass one-time password authentication for online banking.
Google quickly removed the malware, which was reportedly disguised as a legitimate parental control app, from its marketplace.
A new HTTPS remote administration tool for Android-based mobile devices has been discovered for sale on underground marketplaces, according to Symantec security researchers.
Researchers from North Carolina State University have created a tool that uses anomaly detection to distinguish authentic Android applications from those containing root exploit malware.
The most prevalent threat vector that drives mobile device users to malware are web ads, according to a recent study by Blue Coat.
Has mobile malware changed through time as dramatically as the headlines might imply?
Cloud computing is becoming a reality that will need to be addressed by every security department.
A spoofing scam uses real Verizon Wireless tech support number on phone's call ID to trick customers into divulging personal information.
Yair Amit, CTO of Skycure, discusses his company's recent discover of an iOS vulnerability that allows for concealed mobile attack and demonstrates an example of the hack.
Jeff Forristal demonstrated the hack during a session on "predatory hacking of mobile devices."
Speakers at this week's RSA Conference in San Francisco stressed that the bring-your-own-device (BYOD) trend is changing - not ending.
Two senior security researchers have detailed how hackers can use "touchlogging" attack techniques to take control of iOS and Android devices.
In this video Neal Hindocha of Trustwave demos a mobile hack that affects iOS and Android users.
The masses won't ditch passwords until authentication alternatives become more practical in the everyday lives of users, experts said.
In an age of advanced attacks and insider threats, traditional perimeter-based security just doesn't cut it, argue two leading InfoSec experts.
iBanking mobile malware was first introduced to the underground market late last year, according to RSA.
In this latest ebook from SC Magazine, we examine a number of strategies and technologies that can be implemented to manage data and protect corporate assets, while letting employees enjoy the convenience and productivity of mobile devices.
Researchers hope the recently published exploit will spur service providers to provide an update for users.
Dutch telecommunications company KPN announced on Wednesday that it has entered into a partnership with encrypted communications firm Silent Circle and will be offering customers encrypted phone call and messaging services.
Experts have discovered new Android malware that sets itself up on a device via drive-by download and allows for remote code execution.
Researchers at IOActive discovered the vulnerabilities in Belkin's WeMo home automation devices.
Attackers are looking to capitalize on the demise of Flappy Bird by offering up premium SMS-sending doppelgangers for Android devices.
Besides the sheer growth in numbers, in an important trend, mobile malware has followed the same evolution as PC malware, but at a much faster pace.
The hack is achieved by exploiting the service's method of creating security tokens, a researcher found.
All Android users could soon benefit from a new Facebook security tool after the tech giant has decided to share it with the open-source community.
Apple executives had a discussion with FDA Commissioner Margaret Hamburg in mid-December.
HP's Cyber Risk Report 2013 delved into encryption issues affecting data on mobile devices.
More than a million Android mobile devices worldwide are now infected with a crafty bootkit trojan known as Android.Oldboot.1.origin - a number that has more than tripled in a week.
The "touchlogging" attack method will be presented in detail at RSA Conference next month.