Mobile

Back to homepage

Preventing mobile madness – How to manage the connected age

Adopting and understanding modern mobile infrastructure. Mobile devices have firmly established themselves across all industries. Now that the shock of the new has passed, the next step is to effectively

Vulnerability in fully patched Android phones under active attack by bank thieves

A vulnerability in millions of fully patched Android phones is being actively exploited by malware that’s designed to drain the bank accounts of infected users, researchers said on Monday. Click

The way Bluetooth devices ‘talk’ to apps leaves them vulnerable

Mobile apps that work with Bluetooth devices have an inherent design flaw that makes them vulnerable to hacking, a research has found. Click here to view original webpage at www.helpnetsecurity.com

Security by Sector: How Smartphone Biometric Risks Threaten the Banking Industry

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the

Microsoft Intune can now block unauthorized BYOD hardware

Microsoft has integrated third-party mobile threat defense (MTD) software with its Intune unified endpoint management (UEM) platform, enabling corporate systems to detect when an employee’s unenrolled, smartphone or tablet has an app

Risky transactions on mobile devices increase 138% since 2017

Risky transactions on mobile devices are showing an increase of 138% since 2017, iovation survey of 802 consumers from the United Kingdom and 802 consumers from the United States reveals.“Our

Fake Mobile App Fraud Tripled in First Half of 2019

In Q2 2019, RSA Security identified 57,406 total fraud attacks worldwide. Of these, phishing attacks were the most prevalent (37%), followed by fake mobile apps (usually apps posing as those of popular

Cyber Security Today – Trust still needed in security, cheap phones may mean cheap privacy, dump these Android apps

Trust still needed in security, cheap phones may mean cheap privacy, dump these Android apps. Welcome to Cyber Security Today. It’s Monday September 23rd, I’m Howard Solomon, contributing reporter on

Cybersecurity experts raise alarm over new SIM jacking threat

The vulnerability has to be addressed by mobile phone manufacturers and telecom service providers, he said.  HYDERABAD: A new kind of hacking threat targeting SIM cards of smart phones is

Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Following extensive research, Adaptive Mobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being used for targeted surveillance of mobile phone