Scammers who take over smartphone processors can use them to mine for bitcoins, and they can generate a good amount of value too--if they commandeer more than 14 million devices. That's the number of Galaxy S3s needed to mine a single bitcoin in one day, according to a blog post from cybersecurity firm Lookout.
Companies are struggling to deal with the flood of personal devices coming into workplace. Here are six success factors from cloud and mobile security provider Bitglass that IT managers should keep in mind when crafting a BYOD program.
Watch out. It appears that one of the gravest security threats to your home is not stealthy burglar but a connected light bulb.
The number of daily infected users worldwide climbed from below 12,000 in May to more than 16,000 at the end of June.
Most Android devices suffer from a security flaw that enables malware to make unauthorized phone calls, disrupt calls and execute codes that can access device functions and other unauthorized actions, warns IDG News Service.
Encryption foiled attempts by state law enforcement to wiretap criminal suspects' communications in nine cases last year, according to the U.S. Courts system's annual report on wiretapping to the U.S. Congress.
While providing increased mobile speeds and bandwidth, LTE networks are also facing security threats to their architecture, warns LTE security firm Stoke.
The Pangu iOS jailbreaking tool uses an Apple enterprise certificate to jailbreak and possibly gain control of devices running iOS 7.1 or higher, warns Lacoon Mobile Security in a blog.
It's no surprise that a growing number of organizations are allowing BYOD practices. But along with that acceptance is a firm stand that the employee is then on his own, new research confirms.
As security threats to mobile devices and mobile data increase, mobile operators are beginning to invest heavily in securing their mobile infrastructures.