Please turn on your JavaScript for this page to function normally.
What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Researcher points out critical Samsung Android phone vulnerabilities

Tired of waiting for Samsung to fix a string of critical flaws in their smartphones running Android, Italian security researcher Roberto Paleari has decided to inform the …

Enterprise mobility cloud report reveals iOS domination

Citrix released its Enterprise mobility cloud report, revealing key trends that are shaping the enterprise mobility market. The report is based on aggregate data from Citrix …

Beware of fake Candy Crush apps on Google Play

Whenever a mobile game becomes hugely popular, it also becomes a great way for scammers and malware peddlers to lure users into unknowingly installing malicious apps on their …

Free Android malware analysis tool

Bluebox Labs announced Dexter, a free tool to help researchers and enterprise security teams analyze applications for malware and vulnerabilities. The Dexter platform provides …

Improving the security for Android embedded systems

McAfee has delivered a whitelisting security solution for Android based embedded systems. McAfee Application Control for Android resides in the Android kernel, embedded in the …

End of 2012 saw five-fold increase of Android malware

Android malware levels increased more than five-fold between September and December 2012, according to the February 2013 Internet Threats Trend Report issued by Commtouch at …

Korean Android users targeted with SMS-stealing Trojan

The popularity of Starbucks coffee shop coupon application is being misused by malware peddlers to target South Korean Android users and intercept their incoming text …

Worst global cyber threats of 2012

The Nominum security team analyzed DNS data across the globe to identify the worst malicious bots of 2012 and ranked them according to breadth and repercussions of infection. …

HTC agrees to fix vulnerabilities found in millions of its devices

HTC America has agreed to settle Federal Trade Commission charges that the company failed to take reasonable steps to secure the software it developed for its smartphones and …

Centrify offers multi-application SSO for mobile and web apps

At the RSA Conference 2013 in San Francisco, Centrify announced that Samsung Electronics has selected Centrify to provide key enabling technology for Samsung’s next …

Duo Security launches secure mobile ID

Duo Security announced that the high level of security traditionally associated with hardware smart cards is now available on consumer mobile devices that use Duo’s …

Don't miss

Cybersecurity news