A fake iPhone charger could be used to bypass the defenses of Apple's smartphone, three researchers from Georgia Tech have claimed. In...
Fears of cybercrime have become a major concern for many businesses - with security spending rising at four out of ten firms,...
According to a survey by technology industry analysts Gartner, the adoption of mobile devices is happening even faster than expected.
Respected security blogger Brian Krebs reports that an “explosion in Android malware” is being fuelled by a growing market for hijacked of...
We read that “FinFisher spyware made by U.K.-based Gamma Group can take control of a range of mobile devices, including Apple Inc.’s...
In a recent survey of people in America who use their smartphone for work, less than a third said they employ the...
Okay, you got the wrapping paper off the new tablet hotness, fired it up and now cannot put it down. But what...
A while back a malicious program called DroidDream was found on the Google Marketplace. The thing about DroidDream is that it exploited...
Yesterday I blogged about a security company that found a high percentage of apps for the iPhone and for the Android were...
According to Cell-news.com, in 2007 over 850,000 Brits flushed their cell phones down the toilet. I’m sorry to report that there isn’t...
SC Magazine recently reported a malicious application in Google’s Android online market store http://www.scmagazineus.com/malicious-apps-found-in-googles-android-online-store/article/161001/. Due to the highly open nature of Android...
ICE stands for “In Case of Emergency”. The idea is that you put ICE in front of the contact(s) on your phone...
No, nothing to do with drive-by downloads… Our colleagues in Europe came up with a nice idea: an article on the dangers...