Mobile security is a hot topic at the Black Hat security conference being held this week in Las Vegas. I am here at Black Hat and will be sharing mobile security insights with you in the coming days.
Apple is defending the undocumented services resident on iOS devices, which security researcher Jonathan Zdziarski says can be used as a backdoor to sensitive data, as a diagnostic tool for enterprise IT departments, developers and AppleCare service personnel.
Apple has inserted backdoors into iPhones that could enable an unauthorized person to harvest pictures, text messages and other sensitive data from the device without the user's knowledge, Jonathan Zdziarski, an iOS jailbreaker and forensic expert, told attendees of the Hope X conference held in New York over the weekend.
Scammers who take over smartphone processors can use them to mine for bitcoins, and they can generate a good amount of value too--if they commandeer more than 14 million devices. That's the number of Galaxy S3s needed to mine a single bitcoin in one day, according to a blog post from cybersecurity firm Lookout.
Companies are struggling to deal with the flood of personal devices coming into workplace. Here are six success factors from cloud and mobile security provider Bitglass that IT managers should keep in mind when crafting a BYOD program.
Watch out. It appears that one of the gravest security threats to your home is not stealthy burglar but a connected light bulb.
The number of daily infected users worldwide climbed from below 12,000 in May to more than 16,000 at the end of June.
Most Android devices suffer from a security flaw that enables malware to make unauthorized phone calls, disrupt calls and execute codes that can access device functions and other unauthorized actions, warns IDG News Service.
Encryption foiled attempts by state law enforcement to wiretap criminal suspects' communications in nine cases last year, according to the U.S. Courts system's annual report on wiretapping to the U.S. Congress.
While providing increased mobile speeds and bandwidth, LTE networks are also facing security threats to their architecture, warns LTE security firm Stoke.