What happens when you combine a remotely controlled banking Trojan with an abuse of Android Accessibility services? According to new research from ESET, you get an Android Trojan that steals money from
Whether you like it or not, such a mishap may come true someday. I can imagine your anger and despair if it happens, given that a phone isn’t merely a dumb calling
A security researcher used Twitter to warn users about about malware embedded in fake apps available on Google Play. Lukas Stefanko, malware researcher at ESET, reported the malicious apps to
Bitglass has released its 2018 BYOD Security Report. The analysis is based on a survey of nearly 400 enterprise IT experts who revealed the state of BYOD and mobile device
The Media Trust has discovered a recent malvertising campaign involving Apple Pay that is part of a large-scale phishing and redirect campaign targeting iPhone users visiting premium newspapers and magazines.
People who have synced their mobile phones with a wide variety of vehicle infotainment systems may have have their personal information exposed to a new type of vehicle hack, security
Two-factor authentication codes were also exposed in Voxox leak. A huge database with user names, smartphone numbers, SMS messages and even two-factor authentication codes has been exposed, putting personal details at
To diminish threats on unsecured networks, enterprises can take the following action. As mobile device access for workers has increased, so have the potential security threats. All it takes is
Phishing attacks aren’t nearly as successful as they used to be because by now people have learned to look out for the emails that ask them to provide sensitive details.