Mobile and IoT device manufacturers continue to ship products with the Android Debug Bridge feature automatically enabled -- a dangerous default setting that enables potential adversaries to connect to these devices.
Organisational practices and end-user behaviour must both change fast, to deal with rising mobile-focused cyber- attacks, such as phishing, that are now more pervasive than malware.
Mobile users who download untrustworthy apps on their phone often agree to dangerous permissions requests that give attackers essentially unfettered access to their devices' data and functions.
It's critical for service providers to raise awareness regarding the importance of delivering VoIP, whether over mobile or fixed Internet networks, not just cost-efficiently but securely. As connectivity expands, so do the threats.
Mobile devices are more vulnerable to data leaks, given that they can be lost or stolen and can often result in lost or deleted data; the legal ramifications for this are the same as with any other device under the GDPR
Uptake of mobile security apps is low; with mobile operators reporting typical penetration rates are around three to five percent whereas when connectivity providers offer security-as-a-service, uptake rates are up to 40 to 60 percent.
Exploitation of kernel flaws, more mobile attacks, more rogue nation attacks, and increased use of WiFi 'evil twin' networks predicted for 2018 according to Gary Griffiths.
Malicious cryptominers are going mobile and beyond with a new botnet malware targeting Android-based devices that expose debug capabilities to the internet, for the purpose or mining Monero.
Securing and monitoring a complex and distributed IT infrastructure is essential for growth and regulatory compliance. But it requires cooperation by employees at all levels as well as continuous improvements to meet emerging threats.
The vision is that Card Not Present transactions will be increasingly deflected onto other payment channels, completely bypassing the use of card numbers at the website/call centre.
Described by its discoverers Kaspersky Lab as one of the most advanced mobile implants ever, an implant has been found that has been active since 2014 and is designed for targeted cyber-surveillance.
For voice biometrics to become a cross-industry security standard, there is a greater need for a more advanced and robust solution says Nick Gaubitch.
Adopt dynamic authentication of customers for each interaction they perform, and do it as seamless and frictionless as possible: use the mobile devices we all carry. Too much is at stake to rely on shared secrets' as safeguards.
A new mobile malware family, dubbed GnatSpy, that may be a much more dangerous variant of the earlier VAMP malware, has been reported in the wild.
'An individual has no reasonable expectation of privacy in information voluntarily disclosed' is the premise being taken to the US Supreme Court Wednesday, to clarify if law enforcement must obtain warrants to access wireless data
When it comes to avoiding mobile malware no company anywhere on the planet is immune as research shows most companies experienced at least one mobile attack in the last year.
Developers leave API credentials in applications built on Twilio telephony platform allowing phone call eavesdropping.
The FBI hasn't yet broken the phone belonging to a gunman who went on a shooting rampage in a Texas church, killing 26 and wounding 24.
BYOD: Lee Bryant describes how to reap the benefits of remote working without overlooking the risks of personal mobile devices.
Apple iOS 11, Apple has QR scanning functionality enabled by default which Elad Ben-Meir says can effectively make anyone scanning the QR code matrices with Apple devices vulnerable to unknowingly uploading malicious code.
It is possible that everyone in Malaysia may have had their mobile phone records stolen and put up for sale on the Dark Web.
A bug in T-Mobile's wsg.t-mobile.com API may have allowed attackers to access customer data that can be used to carry out phishing attacks or worse.
Apple is disputing claims that it ordered manufacturers to lower the accuracy of its face-recognition to make the iPhone X easier to make.
A quarter of financial service employee mobile devices have unpatched vulnerabilities, according to a recent Symantec report.
Despite keeping the world constantly connected, 4G networks are still plagued with weaknesses that leave entire mobile networks and future "Smart Cities" open to fraud and other attacks.
Mobile devices under increasing attack from malware, including ransomware, which has seen a 122 percent increase in variants as it becomes an increasingly attractive option for criminals.
A malware's been dubbed ExpensiveWall found its way onto Google Play in what has been claimed to have been the second-biggest outbreak to ever hit Google's platform, helping push it to No 2 spot in sources of blacklisted Apps.
Billions of Bluetooth devices, including those running on Android, iOS, Linux, and Windows, contain vulnerabilities that can allow malicious actors to remotely execute code, take over devices, and perform (MitM) attacks.
Apple is doubling down on its privacy beliefs with the latest iOS 11 which will reportedly add at least two new features designed to safeguard its owners' privacy.
A new vulnerability has been discovered affecting older versions of the Google Android Platform.It can be used to easily enable an "overlay attack", tricking the user into unwittingly installing malware onto the device.