When it comes to avoiding mobile malware no company anywhere on the planet is immune.
Cy Vance spoke on the lack of federal legislation to force tech giants to make exceptions in smartphone encryption for when judicial warrants are issued.
Barely one week after the highly anticipated launch of Apple's new iPhone X, security researchers are claiming they were able to defeat its Face ID facial recognition security feature using a carefully crafted mask worth approximately $150.
A new malware has been uncovered that uses an updated methodology to abuse the previously patched Android Toast overlay vulnerability, which once installed, can download additional malware as well as use various permissions to access the phone.
The Texas National Guard last year spent more than $373,000 to install two of its DRT 1301C "portable receiver systems" in two RC-26 secretive surveillance aircraft.
An attack campaign targeting Android users in Austria has been employing a unique trio of techniques to steal their funds: a credentials phishing web page, malicious banking app overlays, and credit card phishing screens.
WWE diva Paige has once again had her intimate photos leaked just a few weeks after a third man plead guilty for hacking into celebrity accounts.
App stores that once distributed the rootkit malware used by ZNIU are now distributing a new iXintpwn/YJSNPI Variant.
A Twitter user is warning girls that Apple's machine learning is capable of categorizing images of women in their intimate apparel that are saved to a device.
In much the same way a forgotten land mine can cause injury years after it was planted and forgotten, researchers are noticing the Ramnit worm popping up on mobile devices two years after its main users were taken down.
A new bill designed to identify, verify, and label compliant Internet-of-Things (IoT) devices with strong cybersecurity standards has been introduced by two federal lawmakers.
A bug within T-Mobile's wsg.t-mobile.com API may have allowed attackers to access customer data that can be used to carry out phishing attacks or worse.
Apple is disputing claims that tech giant ordered manufacturers to lower the accuracy of its face-recognition to make the iPhone X easier to manufacture.
An Android banking trojan dubbed LokiBot turns into a ransomware when users try to remove its admin privileges in a last ditch effort to extort the user.
Encryption has kept the FBI from accessing 7,000 mobile devices, says FBI Director Christopher Wray.
A recent Symantec report found 25 percent of financial service employee mobile devices have unpatched vulnerabilities.
The program represents the first time top Android app developers are being asked establish public-facing vulnerability disclosure programs on the HackerOne platform...with Google Play picking up the tab for bonus bounties.
The Sockbot malware has made its way into at least eight Apps in the Google Play Store with the intent of adding devices to botnets and performing DDoS attacks.
Hackers likely made their way into the personal mobile phone belonging to Chief of Staff Gen. John Kelly last December.
A federal judge has ruled that the Federal Bureau of Investigation does not have to reveal the vendor it hired nor the price paid to access to the iPhone 5C used by San Bernardino shooter Syed Rizwan Malik and his wife Tashfeen.
Artificial intelligence (AI) is taking off as Google's primary method of detecting malware effecting Android and is now detecting more than half of all issues discovered.
Apple's release of iOS 11 patched an out-of-bounds write vulnerability in Wi-Fi chips that, if exploited, could have allowed attackers within range to execute arbitrary code on the firmware.
Apple's iOS 11.01 seems to have addressed previous problems that prevented users from sending emails from Outlook.com and Exchange accounts.
IOActive Senior Security Consultant Alejandro Hernández analyzed 21 of the most used and well-known mobile trading apps.
Malware called ZNIU that is based on CVE-2016-5195, aka Dirty COW, has been found in more than 1,200 malicious Android apps affecting 5,000 users in 40 countries more than a year after the vulnerability first became known.
The time has come for smartphones to come programmed with a duress code that wipes the device clean, in the event a border agent demands to search it, a veteran information security analyst has suggested in an op-ed piece.