smartphones
How to remove the backdoor from ZTE’s Score M smartphone
The existence of the recently discovered vulnerability in ZTE’s Score M smartphone which allows any attacker in possession of the hardcoded password to access and take …
Leveraging PCI standards to accept mobile payments securely
The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …
Survey scammers impersonate Apple via SMS
As the number of smartphone users increases with each passing day, survey scammers have turned some of their attention to targeting users directly via SMS messages containing …
Walmart gift card scam targets smartphone users
Online survey scams are most often propagated through social network and sharing websites, but occasionally users are “assaulted” directly through their …
Securing smartphones and tablets against banking fraud
Trusteer announced a new version of the Trusteer Mobile service which prevents mobile and online banking fraud. The service detects mobile malware infection and helps bank …
Boeing to develop highly secure smartphones
The Boeing Corporation has been working on an Android-based, highly secure mobile phone and aims to launch it later this year, National Defense Magazine reports. Boeing …
Legitimate Chinese app stores riddled with security holes
If you are an Android user, you are surely aware of the fact that Chinese third-party app stores are where most malware for that particular OS has its debut. Lacking any kind …
Top U.S. cities for phone loss
The findings from a phone loss study revealed that lost phones, if unrecovered, could cost U.S. consumers more than $30 billion this year. The analysis, from more than 15 …
Smartphone security checklist
While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are …
Cisco goes beyond BYOD
Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected …
Are mobile password apps pointless?
ElcomSoft analyzed 17 popular password management apps available for Apple iOS and BlackBerry platforms, including free and commercially available tools, and discovered that …
Data protection risks on mobile devices
An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …
Featured news
Resources
Don't miss
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?