Please turn on your JavaScript for this page to function normally.
Researchers create DIY IDS for identifying hacked smartphones

A group of researchers from LMG Security has leveraged a Verizon Samsung femtocell – a small cellular station for extending cell phone coverage range indoors or at the …

Attackers are taking advantage of old vulnerabilities

FortiGuard Labs observed a 30 percent increase in mobile malware in the labs over the last six months. The team is now seeing more than 1,300 new samples per day, is currently …

Enterprises in denial regarding network security

Many enterprises possess an unrealistic confidence surrounding the security of their networks. According to a Lancope survey, more than 65 percent of IT/security professionals …

Russians responsible for 30% of mobile malware

Lookout investigated 10 Russian-based organizations, uncovering that the mobile malware industry in Russia has become organized and profitable. These malware businesses …

FBI uses malware to spy on suspects via their phones

The FBI has been known to use malware to spy on suspects via their computers but mobile phones make even better sources of information. Just think about it: the great majority …

How to avoid digital dangers while traveling

It’s summer holiday season, when people pack up their smartphones and tablets, sunscreen and tank tops and set off for a change of pace. With connected devices …

Researchers hack femtocells, record mobile phones’ calls, SMS traffic

Intercepting voice calls, SMS messages, and web traffic coming and going from a target’s mobile phone may be as simple as waiting for his phone to associate to a …

McAfee Mobile Security offers enhanced privacy protection

McAfee announced an updated version of McAfee Mobile Security offering new privacy features including the Multi-user App Profile function which allows consumers to create …

How to spot and avoid SMS scams

2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …

CIO concerns over security obstructing enterprise mobility

Despite a clear understanding of the benefits and drivers from the end-user community, companies have not mobilized many applications – and a large percentage are …

Security and privacy risks of top mobile apps

Appthority performed a static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms. They analyzed each app for …

Mobile operating system wars: Android vs. iOS

When we introduced Clueful for Android, we thought mobile users should know what the applications on their devices were doing. One year and a couple hundred thousand analyzed …

Don't miss

Cybersecurity news