mobile devices
![WhatsApp](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112253/logo-promo-400x200.jpg)
WhatsApp Gold doesn’t exist, it’s a scam that spreads malware
WhatsApp users are once again targeted by malware peddlers, via messages that offer WhatsApp Gold, supposedly an enhanced version of the popular messaging app previously used …
![mobile devices](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112718/mobile_devices-400x200.jpg)
The fragile security of the mobile ecosystem
Mobile devices such as smartphones and tablets have become indispensable in our daily lives. In fact, in Q4 2015, smartphones accounted for around 75 percent of all mobile …
![Duo Security report](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112745/duo_security_devices-400x200.png)
How secure are the devices connecting to enterprise assets?
Most enterprises have accepted that its employees will use their own various, often mobile devices to access company assets, and have realized that the defined, more easily …
![signal](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112805/signal-400x200.jpg)
Consumers willing to share personal info for a reward
Nearly three in four people have security concerns about using beacon technology on their mobile devices. However, despite these concerns, six in ten will still share personal …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195815/dollar-943737_1280-400x200.jpg)
Rising threats to boost government IT security spending
Technavio analysts expect global government IT security spending to exceed USD 42 billion by 2020, growing at a CAGR of over 9%. “The global IT security spending in the …
![cyber.police android ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112939/Towelroot-400x200.jpg)
Exploit kit targets Android devices, delivers ransomware
Ransomware hitting mobile devices is not nearly as widespread as that which targets computers, but Blue Coat researchers have discovered something even less common: mobile …
![Nexus](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113041/nexus-400x200.jpg)
Flaw allows eavesdropping and tracking of mobile phone users
German hacker Karsten Nohl has demonstrated to the crew of CBS News’ 60 Minutes program how easy it can be for well-resourced attackers to eavesdrop on the phone calls …
![samsung galaxy lock bypass](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113114/samsung-lock-bypass-400x200.jpg)
Samsung Galaxy devices can be made to make calls, send messages while locked
Half a dozen (and possibly even more) Samsung Galaxy phones can be made to place phone calls or send text messages even when they are locked, thanks to exposed USB modems. …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194841/healthcare-400x200.jpg)
Healthcare industry has an alarming mobile security gap
The healthcare industry is massively adopting smart mobile devices, but still moves very slowly when it comes to implementing cyber security measures to protect those devices. …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195637/twitter-verizon2-400x200.jpg)
Developing a mobile health app? Check which federal laws apply
The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …
![WhatsApp encryption](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113255/whatsapp-encryption-400x200.png)
WhatsApp implements end-to-end encryption by default
Over 1 billion users will get end-to-end encryption by default once they update to the latest version of the software. WhatsApp, the most popular messaging app in the world, …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113312/iot-400x200.jpg)
The security impact of IoT evolution
Francis Bacon, First Viscount St. Alban (1561 – 1626), wrote, “As the births of living creatures, at first are ill-shapen, so are all innovations, which are the births of …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints