Please turn on your JavaScript for this page to function normally.
mobile devices
The fragile security of the mobile ecosystem

Mobile devices such as smartphones and tablets have become indispensable in our daily lives. In fact, in Q4 2015, smartphones accounted for around 75 percent of all mobile …

Duo Security report
How secure are the devices connecting to enterprise assets?

Most enterprises have accepted that its employees will use their own various, often mobile devices to access company assets, and have realized that the defined, more easily …

signal
Consumers willing to share personal info for a reward

Nearly three in four people have security concerns about using beacon technology on their mobile devices. However, despite these concerns, six in ten will still share personal …

Rising threats to boost government IT security spending

Technavio analysts expect global government IT security spending to exceed USD 42 billion by 2020, growing at a CAGR of over 9%. “The global IT security spending in the …

cyber.police android ransomware
Exploit kit targets Android devices, delivers ransomware

Ransomware hitting mobile devices is not nearly as widespread as that which targets computers, but Blue Coat researchers have discovered something even less common: mobile …

Nexus
Flaw allows eavesdropping and tracking of mobile phone users

German hacker Karsten Nohl has demonstrated to the crew of CBS News’ 60 Minutes program how easy it can be for well-resourced attackers to eavesdrop on the phone calls …

samsung galaxy lock bypass
Samsung Galaxy devices can be made to make calls, send messages while locked

Half a dozen (and possibly even more) Samsung Galaxy phones can be made to place phone calls or send text messages even when they are locked, thanks to exposed USB modems. …

healthcare
Healthcare industry has an alarming mobile security gap

The healthcare industry is massively adopting smart mobile devices, but still moves very slowly when it comes to implementing cyber security measures to protect those devices. …

Healthcare
Developing a mobile health app? Check which federal laws apply

The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …

WhatsApp encryption
WhatsApp implements end-to-end encryption by default

Over 1 billion users will get end-to-end encryption by default once they update to the latest version of the software. WhatsApp, the most popular messaging app in the world, …

IoT
The security impact of IoT evolution

Francis Bacon, First Viscount St. Alban (1561 – 1626), wrote, “As the births of living creatures, at first are ill-shapen, so are all innovations, which are the births of …

Google Hands
Google Hands Free entering the mobile payments game

Google has announced that it is testing its new payment app, Hands Free, which (as the name suggests) allows users to make payments without the need to use their hands, mobile …

Don't miss

Cybersecurity news