Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android device, security flaws, malicious applications
Trend Micro has updated its mobile security software to detect potential attacks on several Samsung Electronics devices that have a flaw that could allow a malicious application to access all of the phone's memory. The company's Mobile ...
Tags: Trend Micro, mobile security software, Samsung Electronics devices
Up to 10 percent of mobile apps expose user passwords and login names, 25 percent expose personally identifiable information and 40 percent communicate with third parties, according to research results released today by ThreatLabZ, a ...
Tags: highlightedpost, mobile apps, mobile security, mobility, research, Securtiy
A variation of the attack that can wipe data from Samsung Android devices when visiting a malicious Web page can also be used to disable the SIM cards from many Android phones, researchers have said. Ravishankar Borgaonkar, a research ...
Tags: Android, Galaxy Ace, highlightedpost, Samsung, SIM
BitDefender Labs has discovered Android malware that regularly broadcasts the location of the infected mobile device to a remote server. What the malware creators intend to do with the privacy-invading information is not clear. The app ...
Tags: Android malware, infected mobile device, remote server
Google's new app scanner in Android 4.2 Jelly Bean moves the platform closer to Apple's model of vetting software before it is made available to mobile device users, a security expert says. Google isn't expected to copy Apple's model of ...
Tags: Android, app, Apple, application, Gartner, Google, Jelly Bean 4.2, smartphone
The UK national Cyber Security Challenge has announced four face-to-face competitions for the next round of the current challenge. Cyber Security Challenge UK runs a series of national inspirational competitions aimed at attracting ...
Tags: Cyber Security Challenge, face-to-face competitions, cybersecurity
In its November 2012 Blue Coat Mobility Study,the company surveyed 350 respondents and found that most organizations allow employees access to company email(83 percent)and instant messaging(56 percent)on personal devices,but only a fraction ...
Tags: IT, Blue Coat Mobility Study, BYOD, mobile malware
The number of consumer smartphone and tablets brought into workplaces will more than double by 2014, according to a recent study, but security on the endpoints is lacking. Juniper Research claims the number of devices being used in the ...
Tags: BYOD devices, smartphone, tablets, mobile devices
Free smartphone apps pose huge threats to user privacy by collecting unnecessary information,says a report from Juniper Networks. The network security firm analysed 1.7 million applications on the Android market over an 18-month period ...
Tags: android users'privacy, app, collecte unnecessary data, huge threats
One-quarter of more than 400,000 Android apps examined in the Google Play store pose security risks to mobile-device users,according to new research. SECURITY:Android malware market exploding,says Trend Micro Security vendor Bit9 ...
Tags: Security Research, Android apps, mobile-device, Google Play
One-quarter of more than 400,000 Android apps examined in the Google Play store pose security risks to mobile-device users,according to new research. SECURITY:Android malware market exploding,says Trend Micro Security vendor Bit9 ...
Tags: Google, android apps, android malware market, Bit9
Security is still the primary barrier to adopting mobile business applications, a study has found. More than three-quarters of the 300 UK firms polled said they planned to adopt mobile business applications in the next 12 months. But ...
Tags: Security, potential loss of data, risk, personal information
Many companies are not taking into account modern technology and methods when approaching data security, said Cisco senior vice president of security and government, Chris Young, at a press roundtable in London today. Young labelled the ...
Tags: Chris Young, Cisco, Huawei, ZTE
Recruitment firm SThree has taken on mobile device management provider Good Technology's Good for Enterprise product to manage mobile devices being used by nearly half of its 2,000 workforce. SThree was looking into challenges it faced ...
Tags: Technology, Computer, workforce