Tag: mobiles

Bad apps bypasses Android locks 
By Tim Ring | Dec 4, 2013 | Comment Now 
Researchers say Google borked bug bounties.
 
NSA tool may track burner mobiles 
By SC Australia Staff | Oct 15, 2013 | Comment Now 
Metadata provides rough phone fingerprint.
 
New Android ransomware found 
By Danielle Walker | Sep 16, 2013 | Comment Now 
Fake Defender variant linked to porn.
 
Android gets remote wipe, lost device tracking 
By Danielle Walker | Aug 8, 2013 | Comment Now 
Pushed out via Google Play update.
 
Telcos close major SIM card vulnerability 
By Marcos Colon | Aug 5, 2013 | Comment Now 
Flaw allowed attackers to compromise SIMs.
 
Charger can wipe iPhones, install malware 
 
Hundreds of millions at risk from SIM card vulnerability  
 
Microsoft to boot vulnerable apps from stores 
 
Vulnerable apps to be booted from Microsoft stores 
 
Mobile malware up 600% 
By Danielle Walker | Jun 28, 2013 | Comment Now 
But privacy invaders a bigger issue.
 
Ransomware moves to mobile 
By Danielle Walker | Jun 24, 2013 | Comment Now 
Could require manufacturer resets.
 
Phone makers add 'kill switch' to curb data theft  
By Danielle Walker | Jun 19, 2013 | Comment Now 
Would enable remote disabling of phones.
 
BBC laptop losses near half a million dollars 
By SC Staff | Apr 12, 2013 | Comment Now 
195 laptops lost last year.
 
Devil targets banks in Google Play store 
By Darren Pauli | Mar 7, 2013 | Comment Now 
Legit developer accounts sold to malware writer.
 
Android SMS botnet found on mobile networks 
By Danielle Walker | Dec 20, 2012 | Comment Now 
Botnet spread via malicious game install.
 
Telstra users safe from Twitter SMS flaw 
By Darren Pauli, Dan Kaplan | Dec 5, 2012 | Comment Now 
Others should use PIN protection.
 
Industry groups issue web, mobile messaging best practices  
By Danielle Walker | Oct 29, 2012 | Comment Now 
Mobile, malware and phishing covered.
 
Researchers track devices over any 3G network 
By Darren Pauli | Oct 10, 2012 | Comment Now 
Industry watchdog investigates potential vulnerability.
 
Flaws allow 3G devices to be tracked  
By Darren Pauli | Oct 9, 2012 | Comment Now 
Devices trackable over any 3G network.
 
Veracode buys app scanning company 
By Dan Raywood | Oct 8, 2012 | Comment Now 
Veracode moves into mobile app security.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  23%
 
Application integration concerns
  3%
 
Security and compliance concerns
  30%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  4%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 528

Vote