A researcher from Trend Micro reported a flaw in more than half of Android smartphones that an attacker could exploit to render an Android phone "apparently dead – silent, unable to make calls, with a lifeless screen."
Security researchers in Israel have developed a method that bypasses air-gapped computer security by using a low-end mobile phone.
Close to one billion Android smartphones are vulnerable to a text-based attack that could result in an attacker gaining control of a compromised device without the victim's knowledge, warned security firm Zimperium Mobile Security in a blog post Monday.
As more people buy smartwatches and bring them into the enterprise, these same devices could pose significant security risks. HP's Fortify security unit tested 10 different smartwatches and found that all of them were vulnerable to cyberattacks.
As cars get more connected and convenient, IT security risks increase apace. Andy Greenberg with Wired magazine provided a disturbing glimpse into the future of cyberattacks against connected cars.
The Hacking Team, the Italian surveillance firm that was hacked recently, had developed Android malware that was able to sidestep Google's security checks and appear on Google Play as a legitimate news app called BeNews, according to security firm Trend Micro.
T-Mobile received 351,940 U.S. government requests for customer data in 2014, the most of the four major U.S. cellular carriers, CNET reported.
Mobile security is an ongoing IT concern when it comes to BYOD, while convenience is a priority for users. To address both of these concerns, Chinese firm OnePlus has added a fingerprint sensor to its Android-based OnePlus 2 smartphone that it claims is faster than Apple's Touch ID.
Google is launching a bug bounty program for its Android mobile platform.
U.K. banking tech firm Intelligent Environments is trying to convince banks to use emojis instead of PINs for customer account logins.