Mobile & Wireless Security

Key mobile security challenges: Definitive guide for busy tech leaders

Robust mobile security is not only for smartphones but also for portable devices such as laptops and wearables that can…

1 week ago

Google introduces Adiantum encryption for Android devices

If AES encryption is not supported by your Android device, Google’s new Adiantum encryption may be your best bet to…

2 months ago

Google says it’s bolstered its defenses against Play Store malicious apps

The Google Play Store has been in the news way too often in connection with malicious apps that end up…

2 months ago

A boost for anonymity: Tor browser for Android unveiled

The Tor browser, a staple for desktop Internet users who want to remain anonymous, is finally available in an alpha…

7 months ago

Android kiosk mode: Google’s new mobile device enterprise strategy

Some businesses have avoided mobile devices over worries about security and distracted employees. Android Kiosks may be the answer.

7 months ago

Compliance confusion: What does GDPR mean for mobile data?

The GDPR has been on the books for a few months, but its long tentacles are still being felt. If…

9 months ago

New Android malware: MysteryBot banking Trojan the latest headache for researchers

Yet another dangerous malware is threatening the financial sector. The MysteryBot banking Trojan has not been fully unleashed yet, but…

10 months ago

Roaming Mantis malware expands its reach, grows in strength

Roaming Mantis malware is a nasty critter that performs DNS hijacking as its main method of infection. Unfortunately, the malware…

11 months ago

Fake Fortnite app tricks Android users into downloading malware

Android users downloading what they think is an official version of the hugely popular Fortnite are only getting a fake…

11 months ago

iOS sync vulnerability in iTunes allows cybercriminal access

Researchers have found a new iOS sync vulnerability tied to a function within iTunes’ WiFi Sync. If this vulnerability is…

12 months ago