smartphones
Angry Birds know where you live
75% of the public may be giving away their physical location when downloading smartphone applications, according to AdaptiveMobile. 69% of smartphone users are adamant that …
Manage all mobile devices from one destination
Lookout Mobile Security offers security protection and find-my-phone functionality to all tablet devices, including all Honeycomb and Ice Cream Sandwich Android devices, in …
Which mobile OS is most hit by malware?
As most mobile phone users still don’t have a mobile AV solution installed on their devices, it can be rather hard to gauge just how many of them have been hit by mobile …
Smartphone users choose convenience over security
In a revealing survey of smartphone and tablet users, the majority polled admit to not password protecting their mobile devices despite keeping them logged in to sensitive …
Android bugs allow attackers to secretly install malware
Jon Oberheide – the security researcher who has so effectively pointed out the existence of a major security bug in the Android platform nearly a year ago – has …
Mobile threat vectors shift enterprise security strategies
Attacks on smartphones are becoming more common, and according to McAfee Labs, new malware targeting Android devices jumped 76 percent in the last quarter. The need to secure …
Smartphone and tablet security tips
ICSA Labs is offering a series of tips that businesses and consumers can use to protect themselves from security risks aimed at smartphones, tablets and apps. 1. Only buy apps …
Trend Micro enhances mobile security for Android
Trend Micro announced Trend Micro Mobile Security Personal Edition, a solution designed to protect Android smartphones and tablets. In January 2011, Trend Micro introduced …
90% of employees use personal devices for work
IT managers feel they lack the necessary tools to properly manage personal devices. A new survey by DELL Kace revealed 87 percent of companies have employees that use some …
Photobucket app helps catch a thief
Photobucket’s mobile app has played an unexpected role in the catching of a purse-snatching thief in California. The app, set to automatically upload the pictures taken …
Chinese mobile phone monitoring service found
What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …
PoC keylogger app for smartphones revealed
We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …
Featured news
Sponsored
Don't miss
- Cybersecurity is a fundamental component of patient care and safety
- DockerSpy: Search for images on Docker Hub, extract sensitive information
- How AI and zero trust are transforming resilience strategies
- Cybersecurity jobs available right now: September 11, 2024
- eBook: Keep assets secure after cloud migration