- Sony cancels 'The Interview' release after threats following cyberattack
- ‘Backdoor’ may be on 10m Coolpad Android smartphones
- Forensic software gets around iCloud security features
- Obama pushes for net neutrality, opposes data localization in trade pact
- New ransomware avoids hitting the same victim twice
mobile security - News, Features, and Slideshows
A vulnerability in the IBM Endpoint Manager for mobile devices could allow attackers to execute malicious code on the servers used by companies to manage devices.
The Internet of Things (IoT) and smartphones will continue to be under attack in 2015 as cyber criminals find ways to exploit more devices, according to cyber security experts.
An Android Trojan program that's behind one of the longest running multipurpose mobile botnets has been updated to become stealthier and more resilient.
Following a U.S. government warning about an iPhone and iPad security threat dubbed Masque Attack, Apple has issued a statement assuring customers that they're probably okay.
Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
There's a scary new piece of malware that collects call logs, phone-book contacts and other sensitive information from Apple iPhones and iPads. Should you be worried?
A malicious Android app that takes over the screen of devices and extorts money from users with fake notifications from law enforcement agencies was recently updated with a component that allows it to spread via text message spam.
A new technique that allows attackers to hide encrypted malicious Android applications inside images could be used to evade detection by antivirus products and possibly Google Play's own malware scanner.
A new version of an Android worm called Selfmite has the potential to ramp up huge SMS charges for victims in its attempt to spread to as many devices as possible.
The strength of Apple's revised encryption scheme in iOS 8 hinges on users choosing a strong passcode or password, which they rarely do, according to a Princeton University fellow.
Around 45 percent of Android devices have a browser that is vulnerable to two serious security issues, but some countries have a considerably larger percentage of affected users than others, according to data from mobile security firm Lookout.
If you're looking to buy a used iPhone, iPad or iPod touch device, Apple is now offering an online tool to let you first check if it's been locked down by the previous owner, which could indicate that it was actually stolen or lost.
A malware program that targets Hong Kong activists using Apple devices has trademarks of being developed by a nation-state, possibly China, according to a security company.
One mobile device is wiped every three minutes as part of a corporate security policy, according to a study of 130,000 devices managed by MaaS360, the Fiberlink mobile device management platform.
- New Vocus/Amcom entity will have initial personnel restructure
- Schneider Electric wins 2014 Platts Global Energy Award
- New undersea cable to link Australia and New Zealand
- Communications service providers will face heavy capex in coming years: Ovum
- Sony Pictures cancels Christmas day release of 'The Interview' following hacks
- Technology, simplicity and culture: Behind the scenes of Sensis’ digital transformation
- Melbourne Stars look to fan engagement with mobile marketing offer
- Forget 2015: Bing already knows which people, products and trends will win next year
- Predictive analytics for the masses gets closer with vendor investments
- Second-screen ad synching to take off in 2015