Mobile Security

Mobile Security news, analysis, research, how-to, opinion, and video.

Bought a brand-new phone? It could still have malware

Security company G Data has identified more than 20 mobile phones that have malware installed despite being marketed as new, according to a research report.

wifi blocking 2

150817 google marshmallow 03

Certifi-gate flaw in Android remote support tool exploited by screen recording app

An application hosted in Google Play until yesterday took advantage for months of a flaw in the TeamViewer remote support tool for Android in order to enable screen recording on older devices.

popcorn

Legal teams keep bending old laws to fit cybercrimes

Cybercrime laws lag behind the crimes themselves, leaving lawyers faced with creative use of criminal laws that were written before the Internet even existed.

5 details you may miss in apples new macs

Most Apple devices lack proper security for the enterprise

Apple's Macs, iPhones and iPads are common in the modern workplace, but relatively few of these devices comply with standard security requirements, according to a new survey.

Vulnerability in enterprise-managed iOS devices puts business data at risk

A vulnerability in the iOS sandbox for third party applications, like those installed by companies on their employees' devices, can expose sensitive configuration settings and credentials.

Another serious vulnerability found in Android's media processing service

The Android service that processes multimedia files has been the source of several vulnerabilities recently, including a new one that could give rogue applications access to sensitive permissions.

security companies to watch

10 more security startups to watch

Based on the continued interest in security startups from venture capital investors, these companies will continue to proliferate. Here are 10 worth watching.

Hacking Team gives us incontrovertible proof of targeted mobile threats

It’s time to put the same amount of effort into securing our mobile devices as we do our PCs and servers

Zero-day flaw in Google Admin app allows malicious apps to read its files

Attackers could obtain credentials used to manage Google for Work accounts

Google has another try at patching Stagefright flaw

Google has sent the patch to its partners and will fix its Nexus line of devices

Use SAP's mobile platform? Patch now to avoid these 'high risk' vulnerabilities

The flaws could give attackers access to encrypted information

Bastille promises to find malicious wireless devices in corporate networks

Startup Bastille can flag suspicious radio traffic within enterprises to give security pros a means for keeping an eye on wireless Internet of Things devices that would otherwise elude detection.

Mobile banking apps in developing nations have weak security

Attackers could already be using software vulnerabilities to steal money

BlackBerry denies its OS was to blame in Jeep Cherokee hack

The company claims the cause of the vulnerability lies in how the software stack was assembled by Chrysler

IBM finds another Android phone bug

IBM security researchers have found a way to exploit an Android flaw that puts more than 55% of Android phones at risk of being taken over by persistent attackers.

leaky hose

API security leaves apps vulnerable: 5 ways to plug the leaks

Why are APIs becoming the target of hackers? Because they’re everywhere.

080615 android

Android vulnerabilities are scary, but could be a blessing in disguise

Even with the advent of worrying vulnerabilities like Stagefright and a similar issue disclosed this week by hackers from Check Point, the people responsible for managing BYOD environments probably aren’t exactly quaking in their...

healthcare medical symbol

Prominent healthcare CIO: FDA medical device security warning "will be the first of many"

Dr. John Halamka has taken to his "Life as a Healthcare CIO" blog to sound the alarm on medical device threats in the wake of the FDA last week issuing its first cybersecurity warning about a specific medical device.

Attackers could take over Android devices by exploiting built-in remote support apps

Researchers discovered weaknesses in the remote support tools pre-installed on Android devices by manufacturers and carriers

Load More