mobile devices
Chinese mobile phone monitoring service found
What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …
PoC keylogger app for smartphones revealed
We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …
New way of mobile security policy enforcement
AirPatrol unveiled ZoneDefense, a new mobile monitoring and policy enforcement technology that lets enterprises support the use of consumer and mobile devices on premises …
Android malware masquerading as love test app
Online Chinese third party app stores are a treasure trove of Android malware which hides under many guises. Their goal is often the same: get permission from the user to send …
Half of organizations lost information on USB drives
Inexpensive consumer USB Flash drives are ubiquitous in all manner of enterprise and government environments – typically with very little oversight or controls, even in …
Protecting mobile phones? Most don’t bother
Although almost a quarter of consumers (22%) have lost a mobile phone in the past, and a further 12% have had a phone stolen, 67% don’t have passwords set up on their …
SMS spying Android Trojan triggered by keywords
Another week, another trojanized Android app. And, according to Trend Micro researchers, this one has a functionality that differentiates it from similar previous ones: it …
Call-recording Trojan is actually unethical app
The recently discovered Android Trojan that records actual phone conversations seems to represent a lesser danger than previously thought. For one thing, it isn’t hidden …
Mobile threats soared in past six months
Mobile malware has increased significantly, and Android users are two-and-a-half times as likely to encounter malware today than just six months ago, says Lookout. Based on …
Mobile banking security for Android
Webroot has announced it is extending mobile security applications to its partners in banking in order to protect their customers who use tablets and smartphones to conduct …
Entrust strengthens mobile security with device authentication
In an era when mobile devices are commonplace, Entrust introduces a straightforward method for adding digital certificates to mobile devices – and with little management …
Enterprises fail to control mobile access
The results of a Courion survey of 988 IT decision makers at large organizations indicate that whilst organizations are confident that they can assure appropriate user access …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)