Malware in the official Google store never stops appearing. For cybercriminals, sneaking their malicious applications into the marketplace of genuine apps is a huge victory.
While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.
Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.
This short feature aims to draw attention to some of the key things you should be doing to bolster your tablet security to keep cybercriminals at bay.
What awaits us in terms of mobile security trends? Throughout this article, we will discuss how risks might develop in the near future.
ESET's Cameron Camp takes a closer look at security by design for mobile device manufacturers, assessing where we are and where we are heading.
At eight years old, Android is hugely popular. Both with users and attackers.
At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.
Porn clickers pretending to be the the Dubsmash application have found their way back onto Google Play, a month after being removed.
Researchers from Nanjing University have found a way in which hackers could track a smartphone user on the subway - even when limited reception is available.
Not all apps are worth your time and money. We Live Security looks at five signs the app you’re about to download could be risky, and worth investigating further.
Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.
Smartphone authentication: is biometric technology ready to replace PINs and passwords?
The Samsung Galaxy S5 and other 'unnamed Android devices' are vulnerable to having the fingerprints they use for authentication cloned by hackers, reports Gizmodo.
Around 1,500 apps for iPhone and iPad contain an HTTPS vulnerability making it 'trivial' for hackers to perform man-in-the-middle attacks to steal passwords, bank details and other private information.
Last week’s Apple Watch launch has put the spotlight back on the ‘smart’ inter-connected watches that are expected to change how we interact with each other and the internet. But how secure are they?
Nearly 40 percent of large companies - including a significant number in the Fortune 500 - are not taking necessary precautions to secure the apps that they're providing their customers.
A survey of more than a million apps on the Google Play and iOS App Store has found that more than 40 percent of 'risky mobile' apps originate from the United States
Google has announced it is to pay out research grants to security researchers seeking out potential bugs, even if they turn up empty-handed, reports ZDNet.
Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.