Tag:

Mobile Security

Latest Headlines

Latest Headlines

Scams that take over smartphones for cryptocurrency mining just not worth it

Scammers who take over smartphone processors can use them to mine for bitcoins, and they can generate a good amount of value too--if they commandeer more than 14 million devices. That's the number of Galaxy S3s needed to mine a single bitcoin in one day, according to a blog post from cybersecurity firm Lookout.

Infographic: 6 success factors for a BYOD program

Companies are struggling to deal with the flood of personal devices coming into workplace. Here are six success factors from cloud and mobile security provider Bitglass that IT managers should keep in mind when crafting a BYOD program.

And the number one security threat to your home is... a light bulb!

Watch out. It appears that one of the gravest security threats to your home is not stealthy burglar but a connected light bulb.

Mobile payment malware infections are on the rise, warns Cheetah Mobile

The number of daily infected users worldwide climbed from below 12,000 in May to more than 16,000 at the end of June.

Spotlight: Android flaw enables hackers to make rogue phone calls

Most Android devices suffer from a security flaw that enables malware to make unauthorized phone calls, disrupt calls and execute codes that can access device functions and other unauthorized actions, warns IDG News Service.

Spotlight: Encryption foiled law enforcement's wiretap efforts in 9 cases last year

Encryption foiled attempts by state law enforcement to wiretap criminal suspects' communications in nine cases last year, according to the U.S. Courts system's annual report on wiretapping to the U.S. Congress.

Infographic: 5 key points of LTE infrastructure vulnerability

While providing increased mobile speeds and bandwidth, LTE networks are also facing security threats to their architecture, warns LTE security firm Stoke.

Pangu exploits enterprise certificate to jailbreak iOS devices

The Pangu iOS jailbreaking tool uses an Apple enterprise certificate to jailbreak and possibly gain control of devices running iOS 7.1 or higher, warns Lacoon Mobile Security in a blog.

Employers: 'BYOD' means you're on 'your own'

It's no surprise that a growing number of organizations are allowing BYOD practices. But along with that acceptance is a firm stand that the employee is then on his own, new research confirms.

Rise in mobile threats prompts more operator investment in mobile infrastructure security

As security threats to mobile devices and mobile data increase, mobile operators are beginning to invest heavily in securing their mobile infrastructures.