Mobile security threats and prevention
Get the latest news on mobile device threats. Learn how viruses, Trojans, malicious code and worms can infect smartphones, and find out about the latest mobile device attacks can affect iOS, Android and other mobile platforms.
Top Stories
-
News
15 Oct 2021
Burned by Apple, researchers mull selling zero days to brokers
Security researchers have grown frustrated with Apple's lack of communication, ‘silent patching’ of vulnerabilities, denial of bug bounty rewards and other issues. Continue Reading
-
News
12 Oct 2021
Apple patches iOS vulnerability actively exploited in the wild
Apple said in a security advisory that it had received a report that the iOS flaw, which impacts kernel extension IOMobileFrameBuffer, 'may have been actively exploited.' Continue Reading
-
Answer
26 Apr 2017
How does the boot mode vulnerability in Android work?
A boot mode vulnerability allowed attackers to eavesdrop on calls made on certain Android devices. Expert Judith Myerson explains how the complex exploit works. Continue Reading
-
Answer
03 Apr 2017
How did firmware create an Android backdoor in budget devices?
An Android backdoor was discovered in the Ragentek firmware used in almost three million low-cost devices. Expert Michael Cobb explains how to prevent attacks on affected devices. Continue Reading
-
Answer
30 Mar 2017
How did vulnerabilities in AirWatch Agent and Inbox work?
Flaws in AirWatch Agent and AirWatch Inbox allowed rooted devices to bypass the software's security measures. Expert Matthew Pascucci explains how these vulnerabilities worked. Continue Reading
-
Answer
07 Mar 2017
How can the Dirty COW vulnerability be used to attack Android devices?
A copy-on-write vulnerability known as 'Dirty COW' was found in the Linux kernel of Android devices. Expert Michael Cobb explains the risks of this attack. Continue Reading
-
Answer
07 Feb 2017
How did a Signal app bug let attackers alter encrypted attachments?
The Signal app, used for end-to-end encrypted mobile messaging, contained a bug that allowed data to be added to attachments. Expert Michael Cobb explains the flaw. Continue Reading
-
Answer
04 Jul 2016
How can the AirDroid app phone hijacking be prevented?
A vulnerability in the AirDroid device manager app left users at risk of phone hijacking. Expert Michael Cobb explains how the exploit works, and what can be done to prevent it. Continue Reading
-
Feature
05 Oct 2015
Cyber Reconnaissance, Surveillance and Defense
In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Continue Reading
-
Answer
01 Oct 2015
How can power consumption-tracking malware be avoided?
Malware authors are using power consumption tracking-malware to eavesdrop on and attack mobile devices. Expert Nick Lewis explains the threat and how to defend against it. Continue Reading
-
News
28 Aug 2015
Internet of Things security concerns prompt boost in IoT services
News roundup: As Internet of Things concerns become an enterprise reality, one vendor is quick to offer IoT services to combat the risks. Plus: 1% of users create 75% of the risk; Target pays up; Apple devices improperly secured in the enterprise. Continue Reading
-
Answer
13 Aug 2015
How can I mitigate the risks of alternative Android browsers?
Expert Michael Cobb explains the security risks surrounding alternative Web browsers, as well as approaches enterprises can take to prevent BYOD employees from using them. Continue Reading
-
News
03 Mar 2015
Amid Apple Pay fraud, banks scramble to fix Yellow Path process
Banks are rushing to fix sloppy authentication processes at the heart of rising Apple Pay fraud. Experts also worry about potential fraud with other mobile payment systems. Continue Reading
-
Tip
07 Jan 2015
Detecting backdoors: The Apple backdoor that never was?
The debate over the purported Apple backdoor leaves enterprises asking, "When is a backdoor not a backdoor?" Application security expert Michael Cobb explains the difference. Continue Reading
-
Tip
11 Jun 2014
Are malicious mobile apps a mere inconvenience or a real threat?
How big a security threat are the malicious mobile apps riding into your enterprise on employees' mobile devices? Continue Reading
-
News
06 Mar 2012
What are the best Android mobile security apps?
A security testing firm analyzed the malware detection capabilities in dozens of Android mobile security apps. Only 17 made the trustworthy list. Continue Reading
-
Tutorial
05 May 2011
Mobile security policy must-haves
In this presentation, Lisa Phifer explores the legal and liability issues surrounding data on smartphones and tablets as well as security apps for mobile devices, authentication options and procedures for reporting lost or stolen devices. Continue Reading
-
Podcast
05 May 2011
Fact or fiction: Mobile device attacks
Access this podcast to find out how to avoid mobile threats, and discover which of the top five myths about mobile security are true and which are false. Continue Reading
-
News
31 Mar 2011
Mobile app attempts vigilante justice
A new Android application discovered by Symantec attempts to discipline users that download files illegally from unauthorized sites. Continue Reading
-
Answer
28 Feb 2011
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Continue Reading
-
News
03 Jan 2011
Google Android Trojan surfaces in China
The newly discovered Geinimi Trojan infects users of Android smartphones by embedding itself in mobile applications downloaded from third-party services. Continue Reading
-
News
09 Dec 2010
Winn Schwartau on securing mobile devices
Security luminary Winn Schwartau talks about the threats posed by the growing use of smartphones in the workplace and the stuggles faced by IT professionals to properly secure them. Continue Reading
-
News
02 Nov 2010
Assessing the mobile application security threat
Mike Zusman and Zach Lanier of New York-based security consultancy Intrepidus Group on the growing threat posed by poorly coded mobile applications. Continue Reading
-
Tip
06 Oct 2010
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network eavesdropping and spoofing. Continue Reading
-
News
09 Feb 2010
Spyware code targets BlackBerry users
Newly released proof-of-concept code could be tweaked for use on almost any device and demonstrates the need for caution with mobile applications. Continue Reading
-
News
11 Jan 2010
Credit union warns of phony banking Android app
Mobile banking app tries to gain access to financial data. App removed from Android marketplace. Continue Reading
-
News
23 Dec 2009
Is mobile malware all hype?
Some security experts are predicting a smartphone apocalypse, but new data shows a fragmented mobile phone market that could make it difficult to make mobile attacks profitable. Continue Reading