Mobile

Back to homepage

Android Trojan Spreads via DNS Hijacking

An Android Trojan masquerading as popular mobile applications is propagating via smartphones roaming between Wi-Fi networks, Kaspersky Lab warns. Over the span of two months, the Moscow-based security firm observed

Major uptick in mobile phishing URL click rate

In a study of Lookout users, more than half clicked mobile phishing URLs that bypassed existing security controls. Since 2011, Lookout has observed this mobile phishing URL click rate increase

83% Of Enterprises Are Complacent About Mobile Security

These and many other insights are from the recently published Verizon Mobile Security Index 2018 Report. The report is available here for download (22 pp., PDF, no opt-in). Verizon commissioned

Mitigating Digital Risk from the Android PC in Your Pocket

Security Teams Must Prioritize Risk Mitigation Against Android MalwareFew of us could have imagined that a device that allows us to talk to anyone from anywhere at any time would

Businesses suspect their mobile workers are being hacked

More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile Security

Keep your mobile workforce safe: understand the threats

As you review your mobile security strategy, make sure the solutions you choose shield devices from infected apps, man-in-the-middle attacks, OS exploits, malicious links in SMS messages and other exploits.

What’s the C-Suite Doing About Mobile Security?

While most companies have security infrastructure for on-premises servers, networks, and endpoints, too many are ignoring mobile security. They’d better get moving.For too long, too many companies have viewed security

Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware

Recent research from IBM X-Force highlighted banking Trojan operators’ increasing interest in stealing cryptocurrency and analyzed a webinjection scheme the TrickBot Trojan used to deliver stolen coins to attackers’ wallets.

The new front line of cyber security is mobility

The insecurity of mobile devices and the vulnerabilities of public WiFi networks remain at an all-time highMobility is the new front line for security as businesses weigh the advantages of

Android P: Expected security and privacy improvements

Google has released a developer preview of the next version of Android, currently called “Android P.” Functional changes are many, but here’s an overview of those that should improve device