Uptake of mobile security apps is low; with mobile operators reporting typical penetration rates are around three to five percent whereas when connectivity providers offer security-as-a-service, uptake rates are up to 40 to 60 percent.
Exploitation of kernel flaws, more mobile attacks, more rogue nation attacks, and increased use of WiFi 'evil twin' networks predicted for 2018 according to Gary Griffiths.
Malicious cryptominers are going mobile and beyond with a new botnet malware targeting Android-based devices that expose debug capabilities to the internet, for the purpose or mining Monero.
Securing and monitoring a complex and distributed IT infrastructure is essential for growth and regulatory compliance. But it requires cooperation by employees at all levels as well as continuous improvements to meet emerging threats.
The vision is that Card Not Present transactions will be increasingly deflected onto other payment channels, completely bypassing the use of card numbers at the website/call centre.
Described by its discoverers Kaspersky Lab as one of the most advanced mobile implants ever, an implant has been found that has been active since 2014 and is designed for targeted cyber-surveillance.
For voice biometrics to become a cross-industry security standard, there is a greater need for a more advanced and robust solution says Nick Gaubitch.
Adopt dynamic authentication of customers for each interaction they perform, and do it as seamless and frictionless as possible: use the mobile devices we all carry. Too much is at stake to rely on shared secrets' as safeguards.
A new mobile malware family, dubbed GnatSpy, that may be a much more dangerous variant of the earlier VAMP malware, has been reported in the wild.
'An individual has no reasonable expectation of privacy in information voluntarily disclosed' is the premise being taken to the US Supreme Court Wednesday, to clarify if law enforcement must obtain warrants to access wireless data
When it comes to avoiding mobile malware no company anywhere on the planet is immune as research shows most companies experienced at least one mobile attack in the last year.
Developers leave API credentials in applications built on Twilio telephony platform allowing phone call eavesdropping.
The FBI hasn't yet broken the phone belonging to a gunman who went on a shooting rampage in a Texas church, killing 26 and wounding 24.
BYOD: Lee Bryant describes how to reap the benefits of remote working without overlooking the risks of personal mobile devices.
Apple iOS 11, Apple has QR scanning functionality enabled by default which Elad Ben-Meir says can effectively make anyone scanning the QR code matrices with Apple devices vulnerable to unknowingly uploading malicious code.
It is possible that everyone in Malaysia may have had their mobile phone records stolen and put up for sale on the Dark Web.
A bug in T-Mobile's wsg.t-mobile.com API may have allowed attackers to access customer data that can be used to carry out phishing attacks or worse.
Apple is disputing claims that it ordered manufacturers to lower the accuracy of its face-recognition to make the iPhone X easier to make.
A quarter of financial service employee mobile devices have unpatched vulnerabilities, according to a recent Symantec report.
Despite keeping the world constantly connected, 4G networks are still plagued with weaknesses that leave entire mobile networks and future "Smart Cities" open to fraud and other attacks.
Mobile devices under increasing attack from malware, including ransomware, which has seen a 122 percent increase in variants as it becomes an increasingly attractive option for criminals.
A malware's been dubbed ExpensiveWall found its way onto Google Play in what has been claimed to have been the second-biggest outbreak to ever hit Google's platform, helping push it to No 2 spot in sources of blacklisted Apps.
Billions of Bluetooth devices, including those running on Android, iOS, Linux, and Windows, contain vulnerabilities that can allow malicious actors to remotely execute code, take over devices, and perform (MitM) attacks.
Apple is doubling down on its privacy beliefs with the latest iOS 11 which will reportedly add at least two new features designed to safeguard its owners' privacy.
A new vulnerability has been discovered affecting older versions of the Google Android Platform.It can be used to easily enable an "overlay attack", tricking the user into unwittingly installing malware onto the device.
Mobile users who substitute their damaged phone touchscreens or other hardware components with third-party replacements could be infecting their phones with malicious components.
The popular and inexpensive international texting app SMS touch has been found to send critical data in cleartext making the users susceptible to hackers.
Mark Hickman, COO at WinMagic, discusses making the importance of delivering an infrastructure that meets the demands of the now generation, whilst protecting data.
The MotoSecure Hackathon Day, organised by Motorola Solutions and Impact Hub Bamako in Mali's capital city has helped develop several innovative civil protection initiatives.
Hyphens galore as cyber-criminals attempt to hide the web addresses of phishing sites on mobile phones with a lot of punctuation.