Tag: mobiles

Bad apps bypasses Android locks 
By Tim Ring | Dec 4, 2013 | Comment Now 
Researchers say Google borked bug bounties.
 
NSA tool may track burner mobiles 
By SC Australia Staff | Oct 15, 2013 | Comment Now 
Metadata provides rough phone fingerprint.
 
New Android ransomware found 
By Danielle Walker | Sep 16, 2013 | Comment Now 
Fake Defender variant linked to porn.
 
Android gets remote wipe, lost device tracking 
By Danielle Walker | Aug 8, 2013 | Comment Now 
Pushed out via Google Play update.
 
Telcos close major SIM card vulnerability 
By Marcos Colon | Aug 5, 2013 | Comment Now 
Flaw allowed attackers to compromise SIMs.
 
Charger can wipe iPhones, install malware 
 
Hundreds of millions at risk from SIM card vulnerability  
 
Microsoft to boot vulnerable apps from stores 
 
Vulnerable apps to be booted from Microsoft stores 
 
Mobile malware up 600% 
By Danielle Walker | Jun 28, 2013 | Comment Now 
But privacy invaders a bigger issue.
 
Ransomware moves to mobile 
By Danielle Walker | Jun 24, 2013 | Comment Now 
Could require manufacturer resets.
 
Phone makers add 'kill switch' to curb data theft  
By Danielle Walker | Jun 19, 2013 | Comment Now 
Would enable remote disabling of phones.
 
BBC laptop losses near half a million dollars 
By SC Staff | Apr 12, 2013 | Comment Now 
195 laptops lost last year.
 
Devil targets banks in Google Play store 
By Darren Pauli | Mar 7, 2013 | Comment Now 
Legit developer accounts sold to malware writer.
 
Android SMS botnet found on mobile networks 
By Danielle Walker | Dec 20, 2012 | Comment Now 
Botnet spread via malicious game install.
 
Telstra users safe from Twitter SMS flaw 
By Darren Pauli, Dan Kaplan | Dec 5, 2012 | Comment Now 
Others should use PIN protection.
 
Industry groups issue web, mobile messaging best practices  
By Danielle Walker | Oct 29, 2012 | Comment Now 
Mobile, malware and phishing covered.
 
Researchers track devices over any 3G network 
By Darren Pauli | Oct 10, 2012 | Comment Now 
Industry watchdog investigates potential vulnerability.
 
Flaws allow 3G devices to be tracked  
By Darren Pauli | Oct 9, 2012 | Comment Now 
Devices trackable over any 3G network.
 
Veracode buys app scanning company 
By Dan Raywood | Oct 8, 2012 | Comment Now 
Veracode moves into mobile app security.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 327

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  56%
 
No
  44%
TOTAL VOTES: 135

Vote