Please turn on your JavaScript for this page to function normally.
Mobile device security: Tackling the risks

Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a …

Serious flaws in cell phone carrier control software found

At the Black Hat conference this week, two Accuvant researchers have disclosed serious security flaws in the carrier control software used in over 2 billion cellular devices …

Almost 1 in 10 Android apps are now malware

Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses, …

How organizations deal with BYOD and mobile security

A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as …

Exploring the BYOD security dynamic

Webroot examined the use and security of personal mobile devices in the work environment from both the employee and employer perspectives. The initial survey, conducted in …

Risks of selling used smartphones

AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data. From the used devices, researchers was able to recover …

Mobile banking users to exceed 1.75 billion by 2019

Over 1.75 billion mobile phone users will have used their devices for banking purposes by the end of 2019, compared to 800 million this year, according to Juniper Research. …

Exploring the mobile security landscape

In this interview, Adam Ely, COO of Bluebox, discusses the most significant mobile security challenges for enterprise security professionals, illustrates how BYOD is shaping …

Security weakness found in WiFi enabled LED light bulb

Researchers at Context Information Security have been able to expose a security weakness in a WiFi enabled, energy efficient LED light bulb that can be controlled from a …

5 essential mobile security tips

It doesn’t matter if you’re using iOS, Android, Windows Phone or BlackBerry, these tips apply to every mobile device that connects to the Internet. “How …

Cops must get a warrant before looking through cellphone content

The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can’t search the contents of an arrested individual’s cell phone(s) …

Invasive Selfmite SMS worm uncovered

AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite. It spreads via SMS and fools users into installing a worm app which propagates by …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools