Please turn on your JavaScript for this page to function normally.
90% of employees use personal devices for work

IT managers feel they lack the necessary tools to properly manage personal devices. A new survey by DELL Kace revealed 87 percent of companies have employees that use some …

Photobucket app helps catch a thief

Photobucket’s mobile app has played an unexpected role in the catching of a purse-snatching thief in California. The app, set to automatically upload the pictures taken …

Chinese mobile phone monitoring service found

What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …

PoC keylogger app for smartphones revealed

We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …

Drive-by attacks targeting smartphones are in our future

A new study that has analyzed the behavior of 10,000 applications downloaded from the Android Market, shows that many mobile applications leak personal information and that …

Penetration testing for mobile phones

Core Security announced the Core Impact Pro v12 penetration testing software, a commercial-grade solution that pinpoints security exposures in Android, BlackBerry and iPhone …

Mobile threats soared in past six months

Mobile malware has increased significantly, and Android users are two-and-a-half times as likely to encounter malware today than just six months ago, says Lookout. Based on …

First fingerprint-enabled NFC payment transaction executed

NXP Semiconductors, AuthenTec and DeviceFidelity announced that they are jointly developing reference designs that enable highly secure mobile payments via Android-based …

Conversation-spying Android Trojan in the wild

Android malware has so far been spotted doing things like sending text messages or making calls to premium service numbers, sending out information about the device and …

How to secure patient records on mobile devices

Mobile devices have become as common as the stethoscope in patient’s rooms. Physicians routinely review patients’ electronic health records (EHR), read test …

Android malware trends

Could it be that 2011 is the year when the long-standing predictions about the rise of mobile malware come true? Symantec’s Irfan Asrar thinks that there are definite …

The mobile security conundrum

Whilst the range and variety of IT security defenses for portable computers – that’s netbooks and laptops to most people – is excellent, and able to cater …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools