mobile devices
10% of enterprises have at least one compromised device
As the future of work evolves toward mobility, so will the future of data breaches and cybercrime. Recent attacks targeted mobile apps and operating systems to exfiltrate …
XcodeGhost gets updated, now hits also US users
The XcodeGhost threat is far from over, and iOS users are still in danger of unknowingly using apps infected with it, FireEye researchers have warned.“After monitoring …
Security update kills several critical bugs in Android Marshmallow
Google’s November Android security update carries fixes for seven vulnerabilities, including two remote code execution flaws that are rated “critical” …
Nearly 2% of all smartphones are compromised or high risk
By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …
US DOJ admits that Stingrays can be used to intercept call and SMS content
After a battling the US Department of Justice in a court for two and a half years, the American Civil Liberties Union of Northern California has emerged victorious and has …
The top threat vector for mobile devices? Porn
As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …
What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware
Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …
Social experiment: 200 USB flash drives left in public locations
Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and …
IT admits obstacles to user mobility due to security concerns
Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources …
Consumers increasingly adopting personal security measures
With the increase of personal data being stored on mobile devices, a new survey showed that 61 percent of wireless consumers use PINs/passwords, up 20 percent from the survey …
Oysters tablet comes preinstalled with Trojanized Android firmware
“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …
Silent Circle launches Blackphone 2, delivering business and personal privacy
Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …
Featured news
Sponsored
Don't miss
- Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
- LastPass users targeted by vishing attackers
- Protobom: Open-source software supply chain tool
- The key pillars of domain security
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)