smartphones
Nearly 2% of all smartphones are compromised or high risk
By analyzing worldwide threat Intelligence data based on millions of monthly security tests from July through September 2015, a new report found 41 percent of mobile devices …
Android infostealer masquerading as MS Word document
A clever Android information-stealing piece of malware is lurking on third-party app markets popular with Chinese users.“The malware portrays itself as a data file with …
Attackers can use Siri, Google Now to secretly take over smartphones
A team of researchers from the French Network and Information Security Agency (ANSSI) has devised a way to covertly exploit the Siri and Google Now voice activated personal …
Which Android smartphones are most secure?
87% of Android devices are vulnerable to attack by malicious apps and messages, a group of researchers from Cambridge University in England has revealed.For years now, they …
Silent Circle launches Blackphone 2, delivering business and personal privacy
Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …
Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims
A vulnerability in the Swift keyboard, which comes pre-installed on Samsung mobile devices, can be exploited by remote attackers to secretly install malicious apps, access the …
Researchers track Android users by collecting accelerator readings
A group of researchers from Nanjing University, China, have demonstrated that Android users’ movements can be tracked by simply analyzing the data provided by the …
Sniffing and tracking wearable tech and smartphones
Researchers at Context Information Security have demonstrated how easy it is to monitor and record Bluetooth Low Energy signals transmitted by many mobile phones, wearable …
Yahoo develops cheap, effective biometric smartphone authentication
A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully …
Critical BlackPhone bug allows attackers to spy on users
BlackPhone, a mobile phone aimed at users who want to keep their communications secure from mass surveillance attempts, is affected by a critical security vulnerability that …
One-click mobile fraud variant throws browser for a loop
Symantec researchers have recently encountered a new variant of the old one-click mobile fraud, which results in the users’ mobile browser being thrown in a loop and …
Blackphone security issues and vulnerabilities unveiled
Blackphone, the carrier- and vendor-independent smartphone that was created with the goal of placing privacy and control directly in the hands of its users, is not without its …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)