Please turn on your JavaScript for this page to function normally.
Mobile data leakage

Attack vectors in the mobile world are related to apps, content and web. In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, …

Trends shaping mobile forensics in 2014

Mobile forensic provider Cellebrite surveyed its customer base and conducted interviews with leading mobile forensic experts and analysts spanning the industry, asking their …

Protecting APIs, mobile apps and cloud services

CA Technologies announced new and updated identity-based solutions to help secure the increasing number of cloud, web and mobile applications operating in today’s open …

Mobile threats around the world

2013 was a year of change in the world of mobile threats. Campaigns became increasingly targeted as criminals adapted their practices to maximize profit and operate under the …

70% Android devices vulnerable to released remote access exploit

The recent release of a Metasploit module that allows attackers to remotely access (“get shell”) on most Android-running devices has again raised a very good …

Transfer and backup content with a dual USB drive from SanDisk

SanDisk announced the SanDisk Ultra Dual USB Drive, a USB flash drive featuring both a micro-USB and a USB 2.0 connector in a sleek and sturdy form factor. It is designed for …

Beware of Trojanized Flappy Bird game

Trojanized versions of Flappy Bird, the mega-popular iPhone and Android game that has recently been pulled from Google Play and Apple’s App Store by its creator, have …

Facebook bug prevents revocation of app permissions

Developers working for privacy software vendor MyPermissions claim to have discovered a critical vulnerability in Facebook’s code. The flaw can be exploited to make it …

Mobility is the weakest security link

Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all …

Most adults share intimate info via unsecured digital devices

McAfee examined how more than 1,500 consumers are sharing and storing intimate data on their mobile devices, especially with current or former significant others. Sharing …

PoC mobile malware records swipes on touch screen smartphones

A security researcher has developed proof-of-concept malware capable of capturing screenshots and finger swipes on mobile devices, and is set to demonstrate his creation at …

Many Android apps can track your location, access photos

An alarming proportion of Android applications can find and open private photographs on smartphones, track users’ locations, divulge e-mail addresses over the internet …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools