Please turn on your JavaScript for this page to function normally.
iPhone
Attackers can steal smartphone users’ PINs by tapping into data collected by mobile sensors

Researchers have demonstrated that a malicious website or app could work out smartphone users’ PINs or passwords based just on the data collected by various motion …

Android apps
Through inter-app data sharing, Android apps can get your data without permission

With a newly developed toolsuite that can analyze Android apps and detect whether two or more of them can collude with each other to acquire information that they would …

Android graffiti
132 compromised apps removed from Google Play

Google has recently removed 132 Android apps from Google Play due to them containing in their local HTML pages hidden iFrames linking to malicious domains. But even though …

car
Insecure car-controlling Android apps are a boon for car thieves

Being an expensive thing, a car requires an approach to security that is no less meticulous than that of a bank account. Yet, car manufacturers are infinitely more interested …

Netflix
Powerful Android RAT impersonates Netflix app

Mobile malware peddlers often make their malicious wares look like popular Android apps and push them to users through third-party app stores. The latest example of this is …

Meitu
Meitu photo retouching app may be invading your privacy

Have you heard about Meitu, the photo retouching mobile app that turns people into more cutesy or beautiful versions of themselves? Chances are that even if you don’t …

smart toys
Popular smart toys violate children’s privacy rights?

My Friend Cayla and i-Que, two extremely popular “smart” toys manufactured by Los Angeles-based Genesis Toys, do not safeguard basic consumer (and …

Firefox Focus
Firefox Focus: Private iOS browsing made easy

Mozilla has released Firefox Focus, an iOS app that lets you browse the Internet without having to worry who’s tracking your online activity. The app can be used …

apps
By 2018, 25 percent of new mobile apps will talk to IoT devices

With the convergence of devices, bots, things and people, organizations will need to master two dimensions of mobility, according to Gartner. CIOs and IT leaders will need to …

danger
Surge in polymorphic attacks and malicious Android apps

Users are over 20 percent less likely to encounter malware and other undesirable executable files than in 2015. The data, collected by Webroot, shows that, although the number …

Pokemon Go
Bogus Pokémon GO guide app roots Android devices

The popularity of Pokémon GO is apparently on the wane, but there are still more than enough players to make it a good lure for cyber crooks. In fact, fake apps like the …

Businessman
Enterprises too complacent in the face of rising mobile threats

Enterprises continue to fall short when it comes to protecting corporate data on mobile apps and devices, according to the Mobile Security and Risk Review released by …

Don't miss

Cybersecurity news