Please turn on your JavaScript for this page to function normally.
envelope
Cyber crooks push Android malware via letter

Cyber crooks are trying out an interesting new approach for getting information-stealing malware installed on Android users’ smartphones: a physical letter impersonating …

mobile device
What to do if your iPhone or Android smartphone gets stolen?

A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their personal and professional lives stored on their …

strategy
The next wave of mobile threats

According to McAfee, apps, whether for communication, productivity, or gaming, are among the biggest threats to mobile security. Technavio expects the global mobile security …

Drozer
Drozer: Open-source Android security assessment framework

Drozer is an open-source security testing framework for Android, whose primary purpose is to make the life of mobile application security testers easier. Drozer features The …

Stolen Device Protection for iPhone
Apple debuts new feature to frustrate iPhone thieves

Besides fixing an actively exploited zero-day vulnerability, the latest update for the iOS 17 branch offers a new feature to help you protect your accounts and sensitive …

mobile
New method to safeguard against mobile account takeovers

Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where an attacker gains …

identity theft
Don’t be fooled by a pretty icon, malicious apps hide in plain sight

Apps, whether for communication, productivity or gaming, are one of the biggest threats to mobile security, according to McAfee. The end of 2022 saw the release of some …

Google Play
Malicious droppers on Google Play deliver banking malware to victims

Android users are often advised to get mobile apps from Google Play, the company’s official app marketplace, to minimize the possibility of downloading malware. After …

mobile apps
Visibility into runtime threats against mobile apps and APIs still lacking

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …

mobile
Severity of mobile threats rising, 10+ million mobile endpoints impacted

Zimperium published a report unveiling new data and comprehensive analysis of the state of mobile security worldwide. In 2021, the Zimperium zLabs team discovered threats …

Rowland Corr
Leveraging mobile networks to threaten national security

In this interview with Help Net Security, Rowland Corr, Director of National Security Intelligence at AdaptiveMobile Security, explains how mobile networks can be leveraged as …

hunt
Using mobile networks for cyber attacks as part of a warfare strategy

AdaptiveMobile Security published a research which highlights how vulnerabilities in mobile network infrastructure could be weaponized in offensive military operations. …

Don't miss

Cybersecurity news