Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
How to remove the backdoor from ZTE’s Score M smartphone

The existence of the recently discovered vulnerability in ZTE’s Score M smartphone which allows any attacker in possession of the hardcoded password to access and take …

Leveraging PCI standards to accept mobile payments securely

The PCI Security Standards Council (PCI SSC) published a customized fact sheet outlining how merchants can securely accept payments using mobile devices such as smartphones or …

Survey scammers impersonate Apple via SMS

As the number of smartphone users increases with each passing day, survey scammers have turned some of their attention to targeting users directly via SMS messages containing …

Walmart gift card scam targets smartphone users

Online survey scams are most often propagated through social network and sharing websites, but occasionally users are “assaulted” directly through their …

Securing smartphones and tablets against banking fraud

Trusteer announced a new version of the Trusteer Mobile service which prevents mobile and online banking fraud. The service detects mobile malware infection and helps bank …

Boeing to develop highly secure smartphones

The Boeing Corporation has been working on an Android-based, highly secure mobile phone and aims to launch it later this year, National Defense Magazine reports. Boeing …

Legitimate Chinese app stores riddled with security holes

If you are an Android user, you are surely aware of the fact that Chinese third-party app stores are where most malware for that particular OS has its debut. Lacking any kind …

Top U.S. cities for phone loss

The findings from a phone loss study revealed that lost phones, if unrecovered, could cost U.S. consumers more than $30 billion this year. The analysis, from more than 15 …

Smartphone security checklist

While smartphones can make a significant and positive impact on those who embrace the technology, conversely the technology can wreak havoc on its users if they are …

Cisco goes beyond BYOD

Employees are demanding not only to use their own devices at work, but also to have more flexibility in the way they work and when and where they work. The Cisco Connected …

Are mobile password apps pointless?

ElcomSoft analyzed 17 popular password management apps available for Apple iOS and BlackBerry platforms, including free and commercially available tools, and discovered that …

Data protection risks on mobile devices

An increasing number of professionals (80 percent) work remotely and rely on personal devices such as smartphones (63 percent), iPads (30 percent) and laptops (80 percent) to …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools