Mobile

Calif. passes law requiring smartphone kill switch technology

By

Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.

Are Angry Birds flying away with your corporate data?

Are Angry Birds flying away with your corporate data?

BYOD improves employee satisfaction and productivity, but the fact remains that business risk increases dramatically when personal and business applications intermingle.

Hack exposes Secret app confessions

By

Anonymous confessions posted on a popular app, called "Secret," were susceptible to being exposed via a hack.

Report: UK police push for required mobile phone PWs

By

The Metropolitan Police have reportedly lobbied for two years to enact the standard.

FireEye examines popular Google Play apps, 68 percent have SSL flaws

FireEye examines popular Google Play apps, 68 percent have SSL flaws

By

The firm analyzed 1,000 free apps in Google Play which were most downloaded by users.

Bug in iOS Instagram app fixed, impacts Facebook accounts

By

The vulnerability comes into play when Instagram users search for Facebook friends to "follow."

Android RAT spreading through modified legitimate apps

By

An Android RAT known as Krysanec, which can take photos, record audio and steal data, is being spread through modified legitimate apps.

FCC creates task force to scrutinize illegal stingray use

FCC creates task force to scrutinize illegal stingray use

By

The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.

Lookout raises $150 million in financing

By

The mobile security vendor will use the funds to extend its security platform to the enterprises.

Security movement urges automakers to collaborate with researchers

Security movement urges automakers to collaborate with researchers

By

A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

Black Hat: Hackers execute code on mobile POS devices, play their version of Flappy Bird

By

Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.

Analyzing the 'Fake ID' Android vulnerability

By

In this video shot at Black Hat 2014 in Las Vegas, Jeff Forristal of Bluebox Security sits with Danielle Walker, reporter at SC Magazine, to discuss the Fake ID Android vulnerability.

Android malware SandroRAT disguised as mobile security app

By

Users were lured by phishing emails, which supposedly contained a free Kaspersky mobile security app.

Mobile devices are the new endpoints...and both need protecting

Mobile devices are the new endpoints...and both need protecting

By

The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same pond and they all are susceptible to breaches that involve social media use. And how do most people use social media? Mobile devices.

Android malware spreads via mail tracking SMS spam

By

The mobile malware is currently targeting German users, McAfee revealed.

BlackBerry acquires voice and data encryption firm Secusmart

By

On Tuesday it was announced that the phonemaker would purchase the voice and data encryption firm.

Instagram iOS and Android apps vulnerable to session hijacking

By

Two researchers wrote about the Instagram app for iOS and Android is vulnerable to session hijacking because both send unsecured information through HTTP.

HP tests 10 popular IoT devices, most raise privacy concerns

HP tests 10 popular IoT devices, most raise privacy concerns

By

In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.

Vulnerability impacting multiple versions of Android could enable device takeover

Vulnerability impacting multiple versions of Android could enable device takeover

By

Researchers with Bluebox, who uncovered the vulnerability, dubbed it "Fake ID" because it enables the identity of trusted applications to be copied.

Text message spammer settles charges filed by FTC

Text message spammer settles charges filed by FTC

By

Rishab Verma and his company agreed to settle charges filed by the FTC that Verma sent millions of spam text messages that deceitfully promised free merchandise.

Android/Simplocker adds tricks, including ransom message in English

By

Android/Simplocker ransomware now encrypts archive files, asks to be installed as a Device Administrator, and delivers an English-language ransom message.

More charged for roles in three separate Android app piracy groups

By

Indictments unsealed in the Northern District of Georgia on Monday charge members of three separate Android app piracy groups.

Apple denies storing information on Chinese customers

By

Apple responded to a Chinese television broadcasters allegations that the company is storing users information through its location tracking services.

Gmail iOS app vulnerable to MitM attack, emails and credentials at risk

Gmail iOS app vulnerable to MitM attack, emails and credentials at risk

By

Emails and user credentials can be stolen in a man-in-the-middle attack because the Gmail iOS app does not perform certificate pinning.

Nude pics, other data, recovered from 'wiped' Android phones purchased on eBay

Nude pics, other data, recovered from 'wiped' Android phones purchased on eBay

By

After purchasing 20 "wiped" Android smartphones on eBay, AVAST researchers were able to restore photos and other personal information.

Sneaky Android RAT disables required anti-virus apps to steal banking info

Sneaky Android RAT disables required anti-virus apps to steal banking info

By

The HijackRAT for Android mobile devices is capable of numerous attacks, such as pilfering banking information and disabling anti-virus apps.

Google patches buffer overflow flaw in Android KeyStore service

By

The serious buffer overflow vulnerability affects Android 4.3, or devices running Jelly Bean.

Pangu iOS 7.1 jailbreaking tool opens up devices to compromise, researchers find

By

A recently released jailbreaking tool for iOS 7.1 could be used by attackers to compromise iPhones and iPads, mobile researchers found.

Android worm 'Selfmite' pulls pay-per-install scam

By

The discovery of "Selmite" comes two months after the appearance of "Samsapo," believed to be the first Android worm in the wild.

Supreme Court's landmark ruling bars warrantless search of cell phones

Supreme Court's landmark ruling bars warrantless search of cell phones

By

Privacy advocates say the Wednesday ruling will have a positive impact on forthcoming cases involving data security.

Sign up to our newsletters

POLL