Motorola has, perhaps strangely, concluded that it will not be releasing monthly updates for its new Moto Z smartphone. A strange thing to announce, according to the wider industry
NSA Whistleblower Edward Snowden and hacker Andrew Huang have co-designed a smartphone case that tells its owner when their phone is being hacked.
As mobile devices become ever more powerful, they are increasingly being targeted by botnet operators as the ideal members of their zombie armies.
Following Mikko Hypponen's presentation at IP Expo Europe, entitled "Securing Our Future", he elaborated on the theme of threat actors - both corporate and otherwise - in a video interview with SCMagazineUK.com.
Edward Snowden's appearance on last night's Panorama, and his phone hack allegations fail to shock security experts.
SCMagazineUK.com investigates the real value of biometric IDs, particularly fingerprints, on smartphones.
In the age of connected objects, social networks, smartphones and new consumer behaviours, the IT security department has an increasingly important role for enterprises across all sectors, says Thierry Bettini.
Researchers at NowSecure have uncovered a vulnerability in the stock keyboard that is pre-installed on 600 million Samsung devices, including the new Galaxy S6, that can apparently enable a remote arbitrary code execution attack.
Researchers at Context Information Security have discovered that smartphones, tablets, iBeacons, fitness trackers and other wearable devices using embedded Bluetooth Low Energy (BLE) could potentially be tracked from 100m away.
Smartphone users could be offered a new way to protect their devices. Fujitsu is set to introduce iris-scanning technology for phones as an alternative security measure.
Security researchers believe that hackers could intercept and read the low-power electronic signals emitted by laptops and smartphones - even if they're not connected to the internet.
Attacks on Apple iOS devices are rising sharply, with 87 percent of the top 100 paid-for iOS apps now having been cracked and cloned - up from just 53 percent in 2013, according to a new report.
Researchers with the University of California's College of Engineering and the University of Michigan have identified a weakness they believe exists across Android, Windows and iOS operating systems that could allow malicious apps to obtain personal information.
US and German researchers have come up with a novel way to secure the notoriously flaw-ridden Android - a framework that allows corporate and other users to rapidly add security enhancements to Android devices without having to touch the firmware or operating system itself.
After two years of quietly lobbying mobile phone manufacturers such as Apple and Samsung, the Metropolitan Police have gone public with its request for all mobile phone vendors to implement PIN protection as a default setting on a handset.
Here are the five most popular articles, as read by you the reader, in the week for July 4 to 11.
The three main political parties in the UK are in talks about introducing a new emergency law that would require phone companies to log records of phone calls, texts and internet usage.
"Anyone with an understanding of embedded systems could develop the technology to hibernate, rather than switch off, the handset" - Rob Bamforth, Quocirca
The CESG, the security offshoot of GCHQ, has published in-depth guidance for users of laptop, tablet and smartphone operating systems, offering specifics on how to deploy and use the operating systems on a mobile platform.
A team of US researchers has revealed that attackers can use smartphone and tablet 'tilt' and 'swipe' motion sensors - which cannot be blocked - to secretly track users.
MWR researchers hack the "best" new Android devices and say: "there will be a lot of issues like this."
Widely reported changes to the next version of Google's Android are starting to make the operation system "look like a professional platform", say analysts.
British researchers have tested their invention, the Snoopy drone, over the skies of London.
Bring Your Own Device is making waves in business, but concerns remain on how employees use personal smartphones and tablets, how they're managed and the laws to which companies must adhere.
The new "Blackphone" smartphone may have only debuted at last week's Mobile World Congress but concerns are already being raised that it will be targeted by hackers and the NSA.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- The information security implications of M&A deals
- Cyber-security must reflect risk not just regulation
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success