An Android Trojan masquerading as popular mobile applications is propagating via smartphones roaming between Wi-Fi networks, Kaspersky Lab warns. Over the span of two months, the Moscow-based security firm observed
In a study of Lookout users, more than half clicked mobile phishing URLs that bypassed existing security controls. Since 2011, Lookout has observed this mobile phishing URL click rate increase
These and many other insights are from the recently published Verizon Mobile Security Index 2018 Report. The report is available here for download (22 pp., PDF, no opt-in). Verizon commissioned
Security Teams Must Prioritize Risk Mitigation Against Android MalwareFew of us could have imagined that a device that allows us to talk to anyone from anywhere at any time would
More than half (57%) of organisations suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months, according to the iPass Mobile Security
As you review your mobile security strategy, make sure the solutions you choose shield devices from infected apps, man-in-the-middle attacks, OS exploits, malicious links in SMS messages and other exploits.
While most companies have security infrastructure for on-premises servers, networks, and endpoints, too many are ignoring mobile security. They’d better get moving.For too long, too many companies have viewed security
Recent research from IBM X-Force highlighted banking Trojan operators’ increasing interest in stealing cryptocurrency and analyzed a webinjection scheme the TrickBot Trojan used to deliver stolen coins to attackers’ wallets.
The insecurity of mobile devices and the vulnerabilities of public WiFi networks remain at an all-time highMobility is the new front line for security as businesses weigh the advantages of
Google has released a developer preview of the next version of Android, currently called “Android P.” Functional changes are many, but here’s an overview of those that should improve device