A researcher spotted an iOS memory corruption vulnerability which could allow an attacker to seize control of a user's device.
The CopyCat adware that infected over 14 million Android devices employs evasion techniques to avoid detection, including the use of Amazon Web Services and the segmentation of malicious APK files.
Android 7.1 Nougat contains a secret panic mode designed to be triggered in the event that malware locks a user's screen.
Researchers accuse Apple of playing cheap with its bug bounty payout offerings.
SpyDealer was discovered by Palo Alto Networks, and while it has the potential to be quite dangerous, there are several mitigating factors that have helped limit the malware's impact.
Lenovo VICE mobile phones running on Android Lollipop and earlier versions contain three vulnerabilities that allow rooting of the device.
Linux malware is becoming a more important tool for cybercriminals as these individuals focus a greater portion of their attention on attacking IoT devices running the open-source operating system.
Developers of the Android banking malware Marcher are now disguising the trojan as an Adobe Flash Player update, the cloud security company Zscaler has reported in a Thursday blog post.
Samsung Magician recently patched a flaw which could allow an attacker to execute arbitrary code but a separate flaw may have left millions at risk all because of an renewed domain.
Cybercriminals have moved to a new level when attacking mobile devices replacing their simplistic attack methods with sophisticated and stealthier models that now use chain attacks instead of one of the older one-trick pony hacks that simply tried to elevate privileges, according to Checkpoint.
Google has pumped up its Android Security Rewards program, with as much as $200,000 being granted for its top prize.
An unnamed employee in the Medical Records Department mistakenly sent a spreadsheet containing data on former patients.
Security around the president's cellphone communications was tighter during the Obama administration when the then-leader had to relinquish certain apps on his Blackberry and access to his number restricted to just a few people.
A pair of campaigns designed to spread ad fraud malware through supposedly innocuous Android applications generated between 8.5 million and 36.5 million downloads before Google removed the apps from its online store.
Chaos Computer Club hackers have found a way to cheat biometric verification on Samsung Galaxy S8
Google will roll out a new security tool called Google Play Protect over the next few weeks to all Android users.
A malware operation reportedly has been tricking millions of Android device owners into infecting themselves with the Ztorg rootkit trojan by enticing them with offers from ad networks and apps that pay users for installing content.
Banking malware targeting mobile users requires little tech know-how to develop and operate, so it stands as a recurrent battle for security professionals.
A new scam has been spotted that uses legitimate porn sites to spread potentially unwanted apps.
WhatsApp users are receiving scam messages from trusted sources, offering free Netflix access for a year if they pass on a link to 10 of their contacts.
WhatsApp added another layer of protection for users in late 2016, quietly introducing a new feature that encrypts messages and contacts when uploading this data to Apple's iCloud servers, according to a Forbes report.
A flaw in Google Android's security mechanisms reportedly exposes users to ransomware, banking malware and adware attacks, but Google is apparently addressing the issue in its upcoming version of the OS, Android O.
A Trend Micro researcher may have stumbled across a new alliance in place between petty criminals and their more sophisticated cyber cousins that could prove mutually beneficial.
A new strain of malware was detected on Google Play that mobile threat researchers at Check Point dubbed FalseGuide and said was hidden in more than 40 guide apps for games.
A London police officer has purchased malware for mobile phones and computers that can intercept calls, emails and more.