Mobile

Mysterious iOS malware campaign has Chinese origins

By

The threat, dubbed "Unflod Baby Panda," was discovered by Reddit users and analyzed by researchers at the German-based security firm, SektionEins.

Why mobile security requires a holistic approach

Why mobile security requires a holistic approach

One simple truth remains often overlooked - the only secure way to handle mobile devices is to manage them.

Researchers find Android security issue in app permissions protocol

Researchers find Android security issue in app permissions protocol

By

The permissions issue could allow a malicious app to alter legitimate home screen icons.

Trojanized Android apps steal authentication tokens, put accounts at risk

Trojanized Android apps steal authentication tokens, put accounts at risk

By

Rogue Android apps can steal authentication tokens and risk the accounts of some of the most widely used services, including Google, Facebook and Twitter.

File sharing and mobile productivity: How to limit risk

File sharing and mobile productivity: How to limit risk

A more remote and mobile workforce is helping companies to reduce costs and improve employee productivity and collaboration, but organizations are at risk of losing control of their data.

Singapore's NTUC resident members get two-factor authentication devices

By

Added security and no longer having to memorize increasingly difficult passwords are some of the benefits resident members of Singapore's NTUC will get by activating their new OneKey two-factor authentication devices.

iOS 7.1 bug enables iCloud account deletion, disabling Find My iPhone, without password

By

A bug demonstrated by a YouTube user on Wednesday may enable a thief to delete an iCloud account, disable Find My iPhone, and ultimately restore the device, without the need of a password.

Fake Google apps removed from Window Phone Store by Microsoft

By

Five phony Google apps appeared in the app store, each with a $1.99 price tag, before being removed by the company.

Network Rx: Health care security

Network Rx: Health care security

By

With the addition of 15,000 mobile devices accessing its network, a medical center found assurance - and met compliance mandates, reports Greg Masters.

Tesla cars' weak password protocol could allow remote unlock, locating

Tesla cars' weak password protocol could allow remote unlock, locating

By

A researcher at Black Hat Asia highlighted security issues affecting Tesla Model S cars.

Smartphones at risk of malicious code injection through HTML5-based apps

Smartphones at risk of malicious code injection through HTML5-based apps

By

Researchers have discovered a new attack, known as Cross-Device Scripting, that can allow an attacker to compromise most smartphones by injecting malicious code through HTML5-based apps.

Fandango, Credit Karma settle FTC charges of poor app security

Fandango, Credit Karma settle FTC charges of poor app security

By

The companies were accused of failing to securely transmit credit card data, Social Security numbers, and other sensitive data collected by their mobile apps.

Geo-fencing services are transforming mobile security and business growth

Geo-fencing services are transforming mobile security and business growth

Technology enthusiasts and architects are developing networking platforms, applications and services with geo-fencing at their core.

Pileup flaws enable privilege escalation during Android updates, researchers find

Pileup flaws enable privilege escalation during Android updates, researchers find

By

Under the right conditions, simply updating any Android device can enable an attacker to escalate app privileges and carry out all sorts of malicious things.

Zorenium bot said to be updated for iOS, capable of various attacks

Zorenium bot said to be updated for iOS, capable of various attacks

By

A new multipurpose bot known as Zorenium has recently been updated to work with iOS devices, according to the alleged author.

Members of mobile app piracy group Appbucket plead guilty

By

Two Florida men face jail time after pleading guilty to criminal charges related to illegally distributing copyrighted Android mobile device apps.

The great IT and mobile user peace treaty

The great IT and mobile user peace treaty

The average consumer has 40 or more apps installed on their mobile device, many of which they use to do their jobs, whether IT has sanctioned its use or not. The problem is that creates a "shadow IT" system.

Securely adopting 2014's top mobility trends

Securely adopting 2014's top mobility trends

As mobile devices continue to infiltrate organizations, the demand for secure solutions becomes critical.

Lookout toolkit facilitates creation of more visual privacy policies

By

A new tool aimed at helping app developers create short-form privacy policies launched this past week, and the source code is available on Github.

Researcher finds easier way to exploit iOS 7 kernel vulnerabilities

Researcher finds easier way to exploit iOS 7 kernel vulnerabilities

By

A security researcher published a white paper on Wednesday that breaks down exactly how the Early Random PRNG, which protects mobile operating systems from kernel exploits, is vulnerable to brute force.

WhatsApp conversations can be stolen on Android devices

WhatsApp conversations can be stolen on Android devices

By

A Dutch researcher published a proof of concept on Tuesday that shows how a malicious application can be used to steal WhatsApp conversations on Android devices.

Apple's iOS 7.1 fixes 41 bugs, including numerous Webkit flaws

By

Nineteen bugs in web browser engine Webkit were addressed with the update.

Zeus-in-the-mobile variant uses security firm's name to gain victims' trust

Zeus-in-the-mobile variant uses security firm's name to gain victims' trust

By

Android users are tricked into installing a spurious "security" app, which allows fraudsters to bypass one-time password authentication for online banking.

Saboteurs slip Dendroid RAT into Google Play

Saboteurs slip Dendroid RAT into Google Play

By

Google quickly removed the malware, which was reportedly disguised as a legitimate parental control app, from its marketplace.

'Dendroid' RAT trojanizes apps, enables compromise of Android devices

By

A new HTTPS remote administration tool for Android-based mobile devices has been discovered for sale on underground marketplaces, according to Symantec security researchers.

Tool uses anomaly detection to discern real Android apps from root exploit malware

By

Researchers from North Carolina State University have created a tool that uses anomaly detection to distinguish authentic Android applications from those containing root exploit malware.

Malvertising is the top threat to mobile users, study finds

By

The most prevalent threat vector that drives mobile device users to malware are web ads, according to a recent study by Blue Coat.

Mobile: Behind the headlines

Mobile: Behind the headlines

Has mobile malware changed through time as dramatically as the headlines might imply?

Beyond the hype of industry trends

Beyond the hype of industry trends

Cloud computing is becoming a reality that will need to be addressed by every security department.

Scammers use Verizon tech support number to lure users to scam website

By

A spoofing scam uses real Verizon Wireless tech support number on phone's call ID to trick customers into divulging personal information.

Sign up to our newsletters

POLL