Mobile security threats and prevention
- August 12, 2011
A bug in the BlackBerry Mobile Data Service (MDS) Connection Service component can be used to potentially gain network access.
- August 03, 2011
Cross-site scripting flaws enable security researchers to bypass Chromebook security and silently steal sensitive data by hijacking browser sessions.
- August 03, 2011
Android devices are now more than twice as likely to be hit with malware, thanks to new techniques exploiting numerous Android security issues.
- July 22, 2011
Kaspersky CTO wants Apple to open up its iPhone platform, but that could increase the risk of threats, say some security experts.
- July 20, 2011
Researchers will demonstrate an Android phone drive-by attack using a vulnerability in Skype and the smartphone’s Webkit browser engine.
- July 12, 2011
The latest discovery includes a variant of the Zeus Trojan and embedded DroidDream malware in several mobile apps.
- May 24, 2011
Lost and stolen devices are seen as the greatest security concern for IT professionals, according to a new report by McAfee and Carnegie Mellon University.
- May 11, 2011
The networking giant found a 400% increase in Android malware and a rise in spyware targeting iPhone and Blackberry devices.
- March 21, 2011
Technologies that enable credit card payments via mobile phones have prompted the PCI Council to start a mobile task force.
- March 15, 2011
In a strategy briefing to the investors, McAfee president Dave DeWalt outlined the company's vision to bake security into silicon and probe deeper into embedded devices and mobile platforms.
- March 01, 2011
Security researchers have discovered a new mobile malware hidden in apps on unregulated third-party Android marketplaces.
- February 16, 2011
SRA has launched One Vault Messenger, which is a short message service (SMS) encryption product for BlackBerry mobile devices.
- February 14, 2011
Echoworx previewed its mobile encryption platform, promising support for all major smartphone operating systems as well as future tablets.
- January 20, 2011
The popularity of Apple and Google Android mobile devices could put them at risk of falling in the crosshairs of cybercriminals.
- November 30, 2010
The shift to mobile devices is pushing security vendors into retooling their traditional signature technologies, according to Sophos's security strategist, James Lyne..
- October 21, 2010
The Georgia Tech Information Security Center Emerging Cyber Threats Report outlines the increasing sophistication of botnets, mobile attacks and related cybersecurity issues.
- April 22, 2010
At SOURCE Boston 2010, two security researchers showed how they used a combination of hacks and intelligence gathering to profile cell phone users and track their movements.
- February 25, 2010
New threats to mobile phones place personal information, intellectual property and trade secrets at greater risk of theft from hackers.
- December 29, 2009
Karsten Nohl, a widely known encryption expert, has cracked the GSM encryption algorithm and claims software is available for hackers to eavesdrop on calls.
- September 29, 2009
Research In Motion (RIM) is warning that SMS attacks targeting BlackBerry users could take advantage of a certificate handling flaw, tricking users into visiting an attack website.
- July 30, 2009
Researchers have figured out a way to spoof sender numbers, bypass carrier protections and trick mobile devices to pull content from an attacker's server. This would leave users vulnerable to phishing attacks and other scams.
- March 19, 2009
Push notification, copy/paste and Bluetooth peer-to-peer communication features give hackers new areas to target.
- February 19, 2009
Although smartphone makers are reporting millions of devices being sold, IT has been slow to address the security issues that arise from their use in the office.
- February 19, 2009
A new worm attacking Symbian-based phones is spreading via SMS messages and smartphone Internet access, according to security vendor Fortinet's research team.
- January 13, 2009
A malicious PDF attachment can cause memory corruption and allow an attacker to access sensitive data, RIM said in an advisory.
- November 17, 2008
Symantec researchers have discovered a new worm attacking the Windows CE platform on ARM processors.
- July 24, 2008
A new survey found more consumers using their smartphones to access sensitive corporate data opening huge security gaps for enterprises.
- February 14, 2008
Despite the popularity of the iPhone and other handheld devices, security experts say threats against them are still low. But that's only because enterprise use is still limited.
- September 26, 2007
Metasploit creator HD Moore has published shellcode for Apple's iPhone, turning the device into a pocket-sized attack platform.
- August 10, 2007
Mikko Hypponen, director of antivirus research at F-Secure Corp., said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone.
- August 01, 2007
Apple Computer has released software patches fixing critical vulnerabilities in Mac OS X and its newly released iPhone.
- July 23, 2007
Researchers have found a way to take complete control of the Apple iPhone by sending a user to a malicious Web site.
- May 07, 2007
The TJX hackers started their assault two years ago by attacking security holes in the retail giant's wireless system outside a Minnesota Marshalls.
- February 28, 2007
Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them.
- February 22, 2007
Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.
- December 12, 2006
Learn how easy it is for a hacker to gain access to a mobile device, whether employees are aware of security for their devices and why Bluetooth headsets should be turned off.
- November 29, 2006
While much of the information security world has remained focused on threats against PCs and Wi-Fi-enabled laptops, Mikko Hypponen has focused increasingly on potential attacks targeting mobile phones. Hypponen, director of antivirus research for ...
- October 20, 2006
Infected iPods plugged into work machines can pass malware to the larger network, IT administrators say. But the right security tools and policies can blunt the threat.
- October 16, 2006
Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines.
- September 26, 2006
IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies.
- February 27, 2006
Researchers say they've found the first malicious code built to spread from desktop PCs to wireless handhelds, and it could signal a shift in the threat landscape.
- February 10, 2006
Safend Protector lets you define who can use USB ports, what those ports can be used for and who can use wireless connections.
- January 11, 2006
Attackers could exploit a security hole in the BlackBerry Enterprise Server to block attachments or launch malicious code.
- August 06, 2004
Three weeks after the 29A virus group launched Duts, the first proof-of-concept virus for PDAs running PocketPC, a new Trojan horse is targeting the handheld devices.
- July 28, 2004
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics.