Yahoo's new way to log in is far from secure. That is the warning of security researcher Graham Cluley.
Black Box, a robotic "PIN typing" device that uses a USB connection to inject screen taps virtually, can be used to brute force iPhone PINs, warned security researcher Paul Ducklin on the NakedSecurity blog
SecureSmart, the company that secures German Chanceller Angela Merkel's cell phone, showed off a new tablet offering at CeBit and said its offerings will soon come to the U.S.
Google has fixed two critical integer overflow vulnerabilities in Android 5.1 Lollipop that an attacker could exploit to gain control of an Android device, reported SecurityWeek.
This week, an IBM security researcher revealed that a vulnerability in the Dropbox software development kit for Android could allow an attacker to redirect saved data to a different account.
Dell announced on Tuesday that it is beefing up its endpoint security suite to stop malware attacks, secure data and meet compliance requirements for corporate devices.
The number of financial malware attacks against Android devices more than tripled last year, topping 2.3 million, according to a new report by Kaspersky Lab.
Malware often provides a backdoor into a mobile device that an attacker can exploit. When a user brings his or her personal device into the workplace, that backdoor can then lead to the corporate network.
Attackers are launching phishing attacks against victims of iPhone and iPad theft to track victims into supplying iCloud log-in credentials, according to security firm Symantec.
Despite proclaiming in the fall that its Android 5.0 Lollipop operating system would enable full disk encryption by default, Android smartphones are now shipping from manufacturers without encryption by default, reported Ars Technica.