The smartphone: A real bug in your bed
The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …
The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …
To infect a mobile device, the Rootcager/DroidDream Trojan used two known exploits: exploid and rageagainstthecage. If the first one failed to root the device, the malware …
Consumers are indifferent to the many serious security risks associated with the storage and transmission of sensitive personal data on iPhone, Blackberry and Android devices, …
Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …
Malware authors have begun to set their sights on mobile device users, as witnessed by the latest Trojans made for Android-running devices, on official and unofficial online …
An analysis of SMS traffic conducted from March through December 2010 reveals that according to the reports of misuse submitted by AT&T, Bell Mobility, KT, Korean …
More than a third of surveyed smartphone users are not aware of the increasing security risks associated with using their phones for financial purposes and to store personal …
With the proliferation of smartphones and tablets in the enterprise, organizations are under more pressure to keep their content secure from malicious and inadvertent data …
It’s Valentine’s Day, and for all of you who are getting ready to send a valentine to the special people in your life, Microsoft has a warning: be careful what …
The new version of F-Secure’s Protection Service for Mobile (PSM 7) enables operators to offer protection and parental control for their customers’ mobile devices. …
Sophos announced Mobile Control, an extension to its data protection and endpoint security product lines. A steady surge in smartphone adoption poses a new set of challenges …
We often blame users for failing to deny permissions required by malicious applications on Facebook or various mobile platforms, but the truth is that the list of permissions …