mobile devices
Samsung Galaxy S5 fingerprint scanner can be tricked
Samsung’s newly released Galaxy S5 phone sports a fingerprint scanner embedded in the home button that works well but unfortunately, like iPhone 5S’ TouchID before …
Securing mobile applications
In this interview, Dan Cornell, Principal of Denim Group, talks about the most common pitfalls of securing mobile applications, discusses the challenges involved in performing …
Samsung Galaxy enterprise mobility management
Codeproof announced the availability of Enterprise Mobility Management (EMM) for Samsung Galaxy line of devices within its cloud based management platform. “Over the …
Mobile data leakage
Attack vectors in the mobile world are related to apps, content and web. In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, …
Trends shaping mobile forensics in 2014
Mobile forensic provider Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry, asking their …
Protecting APIs, mobile apps and cloud services
CA Technologies announced new and updated identity-based solutions to help secure the increasing number of cloud, web and mobile applications operating in today’s open …
Mobile threats around the world
2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …
70% Android devices vulnerable to released remote access exploit
The recent release of a Metasploit module that allows attackers to remotely access (“get shell”) on most Android-running devices has again raised a very good …
Transfer and backup content with a dual USB drive from SanDisk
SanDisk announced the SanDisk Ultra Dual USB Drive, a USB flash drive featuring both a micro-USB and a USB 2.0 connector in a sleek and sturdy form factor. It is designed for …
Beware of Trojanized Flappy Bird game
Trojanized versions of Flappy Bird, the mega-popular iPhone and Android game that has recently been pulled from Google Play and Apple’s App Store by its creator, have …
Facebook bug prevents revocation of app permissions
Developers working for privacy software vendor MyPermissions claim to have discovered a critical vulnerability in Facebook’s code. The flaw can be exploited to make it …
Mobility is the weakest security link
Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all …
Featured news
Resources
Don't miss
- Microsoft introduces protection against email bombing
- Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463)
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it