Chaos Computer Club hackers have found a way to cheat biometric verification on Samsung Galaxy S8
Google will roll out a new security tool called Google Play Protect over the next few weeks to all Android users.
A malware operation reportedly has been tricking millions of Android device owners into infecting themselves with the Ztorg rootkit trojan by enticing them with offers from ad networks and apps that pay users for installing content.
Banking malware targeting mobile users requires little tech know-how to develop and operate, so it stands as a recurrent battle for security professionals.
A new scam has been spotted that uses legitimate porn sites to spread potentially unwanted apps.
WhatsApp users are receiving scam messages from trusted sources, offering free Netflix access for a year if they pass on a link to 10 of their contacts.
WhatsApp added another layer of protection for users in late 2016, quietly introducing a new feature that encrypts messages and contacts when uploading this data to Apple's iCloud servers, according to a Forbes report.
A flaw in Google Android's security mechanisms reportedly exposes users to ransomware, banking malware and adware attacks, but Google is apparently addressing the issue in its upcoming version of the OS, Android O.
A Trend Micro researcher may have stumbled across a new alliance in place between petty criminals and their more sophisticated cyber cousins that could prove mutually beneficial.
A new strain of malware was detected on Google Play that mobile threat researchers at Check Point dubbed FalseGuide and said was hidden in more than 40 guide apps for games.
A London police officer has purchased malware for mobile phones and computers that can intercept calls, emails and more.
Dozens of malicious Android apps claiming to be the mobile game Super Mario Run have been detected by researchers at Trend Micro.
A spyware program disguised as an app that dispenses Android updates was downloaded between 1 and 5 million times before being pulled from Google's official U.S. Play Store, according to researchers at Zscaler.
A new, simplified two-factor verification sign-in feature for phones that eliminates the need for passwords or one-time code entries is now officially available for Microsoft account-holders.
Snapchat CEO Evan Spiegel might want to tone down his comments while discussing the target demographic for his app.
In addition to a serious battery depletion problem, the FDA said Abbott hadn't incorporated recommendations into its cybersecurity risk assessment plan.
Google's latest iteration of its mobile operating system for Android devices, Android O, helps block some ransomware.
Aga oven owners could have been left scratching their heads over why their food did not cook properly if not for a researcher at Pen Test Partners.
Miley Cyrus, Rosario Dawson and Suki Waterhouse have joined the ranks of Celebgate victims.
Researchers in the UK have uncovered a technique for malicious websites to spy on smart device owners and even decipher their screen touches and PIN number entries by secretly monitoring their devices' sensor data.
The security firm Radware has come across two new forms of Denial of Service (DOS) malware that is attacking and bricking Internet of Things devices for as yet unknown reasons.
The recently uncovered Chrysaor spyware tool has an amazingly complex and stealthy way to record audio that is able to fly under the user's radar.
A Google Project Zero researcher has detailed a series of vulnerabilities in Broadcom's Wi-Fi chipsets that could potentially allow remote code execution on Android and iOS devices.
A joint research investigation has shed light on a recently discovered malware campaign that aims to infect U.S. and Middle Eastern targets with four distinct families of Windows and Android-based downloaders and information stealers.
Samsung's smart device operating system, Tizen - designed to replace Google's Android OS - is the "worst code" ever seen, says security researcher.
A newly discovered variant of the Android ransomware PornDroid eludes all antivirus programs by waiting four hours before executing its malicious activity as well as by employing heavy amounts of obfuscation.