An attacker could exploit security holes in Google Play and Android Web browsers to gain remote control of Android smartphones, warned Tod Beardsley with security firm Rapid7.
Researchers uncover new iOS spyware designed to attack non-jailbroken iOS devices to record audio, take screen shots, and steal personal data.
CIOs and IT security pros are concerned about the security risks that millions of Internet of Things devices can pose to their networks and equipment. To address these security concerns, Verizon Enterprise Solutions rolled out last week a managed certificate security service for enterprises to authenticate IoT devices, reported Larry Dignan with ZDNet.
To encourage IT security researches to root out mobile app vulnerabilities, Google is expanding its bug bounty program to include vulnerabilities in mobile apps, wrote Eduardo Vela Nava, security engineer at Google, in a blog post.
In the race to get enterprise customers, mobile security vendors can differentiate themselves by offering top-notch customer service, argued Denise Culver in a Light Reading article.
Employees at critical infrastructure firms are not just connecting their laptops and mobile phones to the corporate network from home, they are also connecting Internet of Things devices residing on their home network to the corporate network.
A security flaw in Verizon's FiOS service exposed email accounts of Verizon customers to hijacking, reports Security Week.
Mobile malware known as DeathRing is being pre-loaded on factory-shipped smartphones destined for the Asian and African markets, indicating that the mobile handset supply chain has been compromised.
Most IT pros surveyed by the Ponemon Institute believe that negligent and careless employees pose the biggest threat to endpoint security in the enterprise.
Google has decided to stop patching vulnerabilities in WebView, which renders webpages on Android devices, for older versions of Android that make up 60 percent of Android devices in use, according to a blog post by Tod Beardsley of Metasploit.