mobile devices
Korean Android users targeted with SMS-stealing Trojan
The popularity of Starbucks coffee shop coupon application is being misused by malware peddlers to target South Korean Android users and intercept their incoming text …
Worst global cyber threats of 2012
The Nominum security team analyzed DNS data across the globe to identify the worst malicious bots of 2012 and ranked them according to breadth and repercussions of infection. …
Enterprise-class mobility with integrated app SSO from Centrify
At the RSA Conference 2013 in San Francisco, Centrify Corporation announced the general availability of Centrify for Mobile 2013 and Centrify for SaaS 2013, a set of …
Centrify offers multi-application SSO for mobile and web apps
At the RSA Conference 2013 in San Francisco, Centrify announced that Samsung Electronics has selected Centrify to provide key enabling technology for Samsung’s next …
Pwn Pad: A tablet for penetration testers
At the RSA Conference 2013 in San Francisco, Pwnie Express released the Pwn Pad, a tablet loaded with wired and wireless pentesting tools. The Pwn Pad contains bleeding edge …
Mobile phishing geared towards online banking users
When it comes to deploying phishing sites designed to trick mobile users, the great majority of cyber criminals opts for targeting those who engage in e-banking and e-commerce …
Citrix introduces XenMobile MDM
Citrix announced XenMobile MDM, an enterprise mobile device management solution that gives users device choice while also enabling IT to meet its management and compliance …
How CSOs are enabling secure BYOD
Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …
The sophistication of risky apps, mobile misbehavior and spyware
McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …
BlackBerry Enterprise Server can be compromised due to TIFF-processing vulnerabilities
BlackBerry has released details about two critical vulnerabilities that can allow attackers to access and execute code on systems running BlackBerry Enterprise Server. The …
Freezing Android devices to break disk encryption
Two German computer scientists have proved that it’s possible to access and recover data from an encrypted Android smartphone by performing a set of simple and easily …
Mobile network infections increase by 67%
Kindsight released a new report that reveals security threats to home and mobile networks, including a small decline in home network infections and an increase in mobile …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints