Please turn on your JavaScript for this page to function normally.
10% of enterprises have at least one compromised device

As the future of work evolves toward mobility, so will the future of data breaches and cybercrime. Recent attacks targeted mobile apps and operating systems to exfiltrate …

XcodeGhost gets updated, now hits also US users

The XcodeGhost threat is far from over, and iOS users are still in danger of unknowingly using apps infected with it, FireEye researchers have warned.“After monitoring …

Security update kills several critical bugs in Android Marshmallow

Google’s November Android security update carries fixes for seven vulnerabilities, including two remote code execution flaws that are rated “critical” …

Nearly 2% of all smartphones are compromised or high risk

By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …

US DOJ admits that Stingrays can be used to intercept call and SMS content

After a battling the US Department of Justice in a court for two and a half years, the American Civil Liberties Union of Northern California has emerged victorious and has …

The top threat vector for mobile devices? Porn

As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …

What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware

Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …

Social experiment: 200 USB flash drives left in public locations

Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and …

IT admits obstacles to user mobility due to security concerns

Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources …

Consumers increasingly adopting personal security measures

With the increase of personal data being stored on mobile devices, a new survey showed that 61 percent of wireless consumers use PINs/passwords, up 20 percent from the survey …

Oysters tablet comes preinstalled with Trojanized Android firmware

“Keeping your mobile device free of malware requires intentional care, but sometimes even that is not enough. As Dr. Web researchers recently pointed out, a device you …

Silent Circle launches Blackphone 2, delivering business and personal privacy

Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …

Don't miss

Cybersecurity news