Please turn on your JavaScript for this page to function normally.
Cracks in the mobile ecosystem, Internet-connected devices

The interconnectivity of technology has led to a point where many devices are potentially vulnerable, and in the third quarter, the real world impacts of cyberattacks became …

Cross-device tracking via imperceptible audio beacons threatens user privacy

As consumers use multiple devices through the day, and tracking cookies become increasingly less effective, the advertising industry is looking for new ways to track …

Stolen or lost devices and the risks of remote working

44 percent of organizations believe a member of their senior management has lost a mobile device in the last year, whilst 39 percent say senior management had a device …

10% of enterprises have at least one compromised device

As the future of work evolves toward mobility, so will the future of data breaches and cybercrime. Recent attacks targeted mobile apps and operating systems to exfiltrate …

XcodeGhost gets updated, now hits also US users

The XcodeGhost threat is far from over, and iOS users are still in danger of unknowingly using apps infected with it, FireEye researchers have warned.“After monitoring …

Security update kills several critical bugs in Android Marshmallow

Google’s November Android security update carries fixes for seven vulnerabilities, including two remote code execution flaws that are rated “critical” …

Nearly 2% of all smartphones are compromised or high risk

By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …

US DOJ admits that Stingrays can be used to intercept call and SMS content

After a battling the US Department of Justice in a court for two and a half years, the American Civil Liberties Union of Northern California has emerged victorious and has …

The top threat vector for mobile devices? Porn

As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …

What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware

Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …

Social experiment: 200 USB flash drives left in public locations

Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and …

IT admits obstacles to user mobility due to security concerns

Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources …

Don't miss

Cybersecurity news