Mobile

Back to homepage

Millions of Android devices forced to mine Monero for crooks

No device is safe from criminals looking to make it stealthily mine cryptocurrency for them. However weak its processing power is, it still costs them nothing.With that in mind, forced

How to track smartphone users when they’ve turned off GPS

As it turns out, turning off location services (e.g., GPS) on your smartphone doesn’t mean an attacker can’t use the device to pinpoint your location.A group of Princeton University researchers

Hotspot Shield VPN flaw can betray users’ location

A flaw in the widely used Hotspot Shield VPN utility can be exploited by attackers to obtain sensitive information that could be used to discover users’ location and, possibly and

Android devices roped into new Monero-mining botnet

A new Monero-mining bot sprang up a few days ago and, in just a few days, has created a botnet consisting of over 7,000 Android devices, most of which are

ADB.Miner, the Android mining botnet that targets devices with ADB interface open

Security researchers at Qihoo 360’s Netlab have spotted a new Android mining botnet over the weekend. The malicious code ADB.Miner targets Android devices by scanning for open ADB debugging interface

The future of smartphone security: Hardware isolation

Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they queried, 100%

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company’s mobile print security up to speed?When you think about mobile devices and security, printing probably isn’t the first thing

Security-as-a-Service Bolsters Customer Satisfaction

Communications service providers (CSPs), which have notoriously poor customer satisfaction ratings as an industry, can bolster loyalty by delivering security-as-a-service for mobile devices, research has revealed.According to Allot Communications’ latest

Google removes 60+ fake game apps displaying porn ads from Google Play

Google has removed some 60+ game apps from Google Play, as they were found to contain code that either delivered inappropriate and pornographic ads, attempted to trick users into installing

Mobile App Flaws of SCADA ICS Systems Could Allow Hackers To Target Critical Infrastructe

In a report released today, by IOACTIVE, researchers’ advice that critical infrastructure mobile applications are being developed without secure coding compliance that could allow hackers to target Supervisory Control and