mobile devices
Unlock your digital world with True Key
Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …
The hidden dangers of third party code in free apps
Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps. When people install and use free …
Trends in Internet trust exploits, IoT, cyber espionage and privacy
In the third quarter, McAfee Labs detected more than 307 new threats every minute, or more than five every second, with mobile malware samples growing by 16 percent during the …
Why you should protect your wireless connection
It’s holiday shopping season again, and consumers will join the rush to buy devices and accessories for loved ones. They’ll scoop up phones and tablets, plus …
Mobile Pwn2Own 2014: Windows Phone’s sandbox resists attack
The Mobile Pwn2Own 2014 hacking competition, held at the PacSec Applied Security Conference in Tokyo, Japan, was concluded on Thursday, and not one of the targeted phones has …
Many IT pros store compromising material on their mobile phones
It appears that Jennifer Lawrence is not the only one with risqué photos on her mobile device. According to a new survey from ESET, 39 percent of the UK’s leading IT …
Mobile security breaches impacted 68% of organizations
Mobile security breaches have affected 68 percent of organizations in the last 12 months, according to a new global study from BT. Despite this, organizations are still not …
Extracting data from air-gapped computers via mobile phones
A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow …
Over one-third of all enterprise data leakage policy violations occur on mobile devices
Nearly half of all cloud app activities and more than one-third of all data leakage policy violations occur on mobile devices, say the results of the October 2014 Netskope …
Samsung users could be locked out of their devices by attackers
A zero-day flaw in Samsung’s Find My Mobile system that can be extremely easily exploited to remotely lock a target’s phone has been uncovered by programmer and …
40% of enterprise employees use personal devices for work
Approximately 40 percent of U.S. consumers who work for large enterprises said they use their personally owned smartphone, desktop or laptop daily for some form of work …
What all major brands share in common with the Snappening
By now we have all heard about “The Snappening”—hyped as a high-profile data breach involving the photo-sharing application Snapchat. Virtually every news outlet …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)