mobile devices
![Checkmarx research](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/19135933/checkmarx-android-research-400x200.jpg)
Android camera apps could be hijacked to spy on users
A vulnerability in the Google Camera app may have allowed attackers to surreptitiously take pictures and record videos even if the phone is locked or the screen is off, …
![WhatsApp](https://img.helpnetsecurity.com/wp-content/uploads/2019/11/18141221/whatsapp-geometric2-400x200.jpg)
WhatsApp RCE flaw can be exploited by sending malicious MP4 files
Facebook has patched a critical vulnerability (CVE-2019-11931) affecting various versions of its popular WhatsApp Messenger app and is urging users to update as soon as …
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095708/mobile_work-400x200.jpg)
Risky transactions on mobile devices increase 138% since 2017
Risky transactions on mobile devices are showing an increase of 138% since 2017, iovation survey of 802 consumers from the United Kingdom and 802 consumers from the United …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195815/dollar-943737_1280-400x200.jpg)
Consumer spending on technology forecast to reach $1.69 trillion in 2019
Consumer spending on technology is forecast to reach $1.69 trillion in 2019, an increase of 5.3% over 2018. Traditional technologies still dominate According to the latest …
![Simjacker](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093241/simjacker-1-400x200.jpg)
Simjacker vulnerability actively exploited to track, spy on mobile phone owners
Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093412/android2-400x200.jpg)
Security hole opens a billion Android users to advanced SMS phishing attacks
Check Point Research has revealed a security flaw in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. The …
![Samsung](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100913/samsung-phone-400x200.jpg)
49% of all risky online transactions come from mobile devices
About half of all risky online transactions appear to be coming from a mobile device, according to iovation. Specifically, in the first half of 2019 49% of all risky …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
Phishing is a billion-dollar global industry, consumers are the main target
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better …
![FaceApp](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093859/faceapp-400x200.jpg)
FaceApp privacy panic: Be careful which apps you use
The privacy panic over FaceApp, the selfie-editing mobile app that makes photo subjects younger, older or turns them into members of the opposite sex, has been overblown. The …
![mobile apps](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102223/mobile-apps-400x200.jpg)
How mobile use cases in financial services are affecting security
Financial services organizations are increasingly exposed to cyber threats, according to Wandera. The report “Mobile Security in the Financial Services,” includes analysis …
![iPhone](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094202/iphone2-400x200.jpg)
Most organizations plan to adopt new authentication solutions within two years
Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …
![Wandera](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09094010/wandera-400x200.jpg)
Protect privacy and provide secure mobile access to corporate data
In this Help Net Security podcast, Mike Campin, VP of Engineering at Wandera, talks about how their solution solves a problem that every business is facing today, which is how …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD