Tag "Mobile Security"

Back to homepage
Mobile

Millions of Android devices forced to mine Monero for crooks

No device is safe from criminals looking to make it stealthily mine cryptocurrency for them. However weak its processing power is, it still costs them nothing.With that in mind, forced

Mobile

How to track smartphone users when they’ve turned off GPS

As it turns out, turning off location services (e.g., GPS) on your smartphone doesn’t mean an attacker can’t use the device to pinpoint your location.A group of Princeton University researchers

Mobile

Hotspot Shield VPN flaw can betray users’ location

A flaw in the widely used Hotspot Shield VPN utility can be exploited by attackers to obtain sensitive information that could be used to discover users’ location and, possibly and

Mobile

Android devices roped into new Monero-mining botnet

A new Monero-mining bot sprang up a few days ago and, in just a few days, has created a botnet consisting of over 7,000 Android devices, most of which are

Mobile

ADB.Miner, the Android mining botnet that targets devices with ADB interface open

Security researchers at Qihoo 360’s Netlab have spotted a new Android mining botnet over the weekend. The malicious code ADB.Miner targets Android devices by scanning for open ADB debugging interface

Hardware/Network Mobile

The future of smartphone security: Hardware isolation

Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they queried, 100%

Mobile

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company’s mobile print security up to speed?When you think about mobile devices and security, printing probably isn’t the first thing

Software

Crypto-Mining: The Next Ransomware

Hackers are opportunistic by nature. As device manufacturers continue to add more CPU cores and gigabytes of RAM to smartphones and tablets as well as enterprise-grade cloud servers, these devices

Mobile

Security-as-a-Service Bolsters Customer Satisfaction

Communications service providers (CSPs), which have notoriously poor customer satisfaction ratings as an industry, can bolster loyalty by delivering security-as-a-service for mobile devices, research has revealed.According to Allot Communications’ latest

Identity Theft

Data breaches at an all time high: How are businesses protecting themselves?

Digitally transformative technologies are shaping the way organisations do business and moving them to a data-driven world, with 94% of organisations using sensitive data in cloud, big data, IoT, container,