More Mobile Security News
Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows.
One day after announcing the Galaxy S5 smartphone with a security-focused fingerprint scanner, Samsung announced that second-generation Knox software for enterprise-level security and management of Samsung devices will ship sometime in the second quarter.
Security researchers identified a vulnerability in iOS that allows apps to record all touch screen and button presses while running in the background on non-jailbroken devices.
Blackphone, the Swiss start-up that's launching a smartphone with encrypted communications, is planning a series of devices around the same idea, one of the company's co-founders said.
U.S. cellphone carriers were offered a technology last year that supporters say would dramatically cut incidents of smartphone theft, but the carriers turned it down, according to sources with knowledge of the proposal.
Pressure on the cellphone industry to introduce technology that could disable stolen smartphones has intensified with the introduction of proposed federal legislation that would mandate such a system.
A vulnerability in Snapchat allows attackers to launch denial-of-service attacks against users of the popular photo messaging app, causing their phones to become unresponsive and even crash.
Politicians and law enforcement officials in California will introduce a bill on Friday that requires all smartphones and tablet PCs sold in the state be equipped with a digital "kill-switch" that would make the devices useless if stolen.
Over the past several months security researchers have found serious vulnerabilities in many mobile advertising libraries that could be exploited to abuse the permissions of Android apps or to execute unauthorized code on users' devices. The risks resulting from those vulnerabilities would be significantly lower if those libraries would use HTTPS, security researchers said.
A vulnerability in Android allows malicious applications to bypass an active VPN (virtual private network) connection and force traffic from the device through an attacker-controlled system where it can be intercepted, according to security researchers from Ben-Gurion University of the Negev in Israel.
The software used by many wireless IP cameras manufactured by Foscam Digital Technologies have a vulnerability that allows remote users to access their video streams and take snapshots without proper authentication.
Intel plans to ditch the venerable McAfee brand for its security products and services, and offer free mobile security software to customers running Android, iOS and other OSes on their smartphones and tablets.
A security analysis of mobile banking apps for iOS devices from 60 financial institutions around the world has revealed that many were vulnerable to various attacks and exposed sensitive information.
A security hole in popular photo messaging service Snapchat could allow attackers to find the phone numbers of many users in a short period of time, according to Gibson Security, a computer security research group.
Kill-switch technology that can render a lost or stolen smartphone useless would become mandatory in California under a new bill that will be proposed to the state legislature in January.
The Android 4.4.2 update that began to roll out Monday to Google's Nexus devices removed a feature that gave users fine-grained control over app permissions, prompting criticism from the Electronic Frontier Foundation.
Microsoft has joined the FIDO Alliance, an industry group attempting to craft industry standards that reduce reliance on passwords, long regarded as a weak point in Web security.
A widely used security feature intended to protect access to online bank accounts is becoming increasingly ineffective, as cybercriminals develop advanced malicious software for Android devices, according to a report released Wednesday.
The browser cookies that online companies use to track Internet customers for targeted advertising are also used by the National Security Agency to track surveillance targets and break into their systems.
Register for FREE now! »
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
Webinar: Building a Big Data solution that's production-ready
Big data solutions are no longer just a nice-to-have.
Meg Whitman presents Unlocking IT with Big Data
During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
The New Way to Work Knowledge Vault
This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
Getting Ready for BlackBerry Enterprise Service 10.2
Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
Containerization Options: How to Choose the Best DLP Solution for Your Organization
This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- All Mobile Security Webcasts