More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system. Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and ...
Tags: Computer Products, software
Fiberlink?, the leader in cloud-based enterprise mobility management (EMM), announced the results of its online survey, conducted by Harris Interactive, which reveal employees are unknowingly putting enterprise data at risk. Among 2,064 ...
Tags: Consumer Electronics
Over three quarters of Android threats are malicious apps that send SMS messages to premium rate numbers and could be mitigated by a protection feature present in Android 4.2, according to researchers from networking vendor Juniper ...
Tags: Android Threats, Apps, Android 4.2
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices. Security researchers from antivirus firm ...
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure. The ...
Tags: Android, Computer Products
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn. The vulnerability, identified as CVE-2013-2423, was ...
Tags: Computer Products, software
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
Smartphone manufacturer HTC has agreed to settle Federal Trade Commission (FTC) charges that the firm failed to take "reasonable steps" to patch security vulnerabilities in its products, thus putting information belonging to millions of ...
Tags: HTC, obile Security Flaws, company news
The U.S. Federal Trade Commission has reached a settlement with HTC America over security holes in the company's smartphone and tablet software that left millions of users' personal information at risk. Under the terms of the agreement, ...
Tags: HTC America, smartphone, tablet, software
Security vendor Bit9 promised to release limited details of a hack caused by a failure of the company to install the same security software on its own network that it sells to a handful of Fortune 500 companies. Bit9, which is based in ...
Tags: Bit9, security software, network
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge for ...
Tags: botnet, SMS spam, Android phones, victims
A suspected fault in how Samsung Electronics has implemented the Android's kernel in several of its devices could allow a malicious application to gain total control over the device. The vulnerability was described on Saturday by the user ...
Tags: Samsung, Computer Products, Android
Over half of Android devices are vulnerable to known security flaws that can be exploited by malicious applications to gain complete access to the operating system and the data stored on it, according to a report from mobile security firm ...
Tags: Android, applications, critical, devices, vulnerabilities
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge ...
Tags: spammers, a mobile spam campaign, spam messages, Android