mobile devices
Android bug allows app code change without breaking signatures
Researchers from Bluebox Security have discovered a critical Android flaw that allows attackers to modify the code of any app without breaking its cryptographic signature, and …
Protect your company from BYOD security threats
With users wanting to connect their personally owned computers to corporate infrastructure, IT admins have to find the right balance between providing services, and securing …
Abuse of mobile app permissions
McAfee Labs found that under the camouflage of “free” apps, criminals are able to get consumers to agree to invasive permissions that allow scammers to deploy …
Mobile and cloud data risks exposed
A new Ponemon eport focuses on the risks associated with employee access to regulated data, such as protected health and financial information, via company or personal mobile …
Blizzard suspends mobile app access following account hijacks
A number of World of Warcraft players have been unpleasantly surprised this last week to find that someone has apparently broken into their accounts and bought low-level items …
AirWatch enhances laptop management solution
AirWatch announced enhancements to its laptop management solution that provides additional functionality and platform support for organizations that need to manage all of …
Private, secure texting app for iOS
With an estimated 6 billion text messages sent every day in the United States alone, text messaging has become the primary means of communication for a large portion of the …
SMBs are embracing cloud-based services
Cloud-based applications are forcing SMBs to balance IT requirements with employees’ needs for anytime, anywhere access to information, according to Spiceworks. …
Customized spam uses cell phone users’ data against them
US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile. For the first time, mobile …
How to detect hidden administrator apps on Android
Following the discovery of a new Android Trojan that uses several errors and vulnerabilities in the Android OS to make analysis harder for researchers and to remain hidden …
CyanogenMod founder aims to thwart data-grabbing apps
There’s some very good news for users of CyanogenMod, one of the most popular modified Android firmware on the market: its founder and main developer Steve Kondik (aka …
Is accessing work apps on the move destructive?
There’s a lack of mobile working policies can lead to destructive consequences for businesses, according to Ping Identity. On a regular basis, 44% of employees access up …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware