New Android exploit lets hackers steal passwords with hidden on-screen tricks

New Android exploit lets hackers steal passwords with hidden on-screen tricks

Researchers have discovered a new exploit that could let hackers secretly hijack your phone while you’re using it. They successfully carried out proof of concept attacks on multiple versions of Android, up to the 7.1.2 build of Nougat.

Survey: Half of CIOs Say Budget Constraints Are Biggest Risk to Protecting Patient Data

Survey: Half of CIOs Say Budget Constraints Are Biggest Risk to Protecting Patient Data

The survey results indicate that CIOs are aware of the challenges and opportunities involved in getting their arms around data security and mobile communication options for their organizations. Practically all CIOs (95 percent) are concerned about data being compromised.

Google Play Protect wants to stop your Android apps from going rogue

Google Play Protect wants to stop your Android apps from going rogue

Google is giving its anti-malware service a more prominent position in Android and it's working on a partial fix for its version fragmentation problem.

Zomato security breach ends up with 17 million stolen user records

Zomato security breach ends up with 17 million stolen user records

The popular food discovery app, Zomato, has announced that there was a security breach and over 17 million user records have been stolen from its database. The stolen data contains personal information like username, hashed passwords and email addresses.

 

How to tell if you're at risk from the WannaCry ransomware and what to do if you have been attacked

How to tell if you're at risk from the WannaCry ransomware and what to do if you have been attacked

Businesses are still dealing with the fallout from a cyberattack that hit 200,000 victims in 150 countries, with many organizations and individuals wondering if they are at risk.

A Massive Ransomware 'Explosion' Is Hitting Targets All Over the World

A Massive Ransomware 'Explosion' Is Hitting Targets All Over the World

On Friday, multiple organizations, including hospitals and telecommunications companies, reported falling victim to ransomware, and researchers said a worldwide campaign of attacks was ongoing. However, the full extent of the hacks, and whether all of them were connected to one another, is unclear.

Google will soon require Android for Work profiles for enterprise users

Google will soon require Android for Work profiles for enterprise users

Google recently announced that enterprise mobility customers will be required to use Android For Work profiles. Here's what this means for companies using Google Mobile Management.

DHS Delivers Study On Government Mobile Device Security To Congress

DHS Delivers Study On Government Mobile Device Security To Congress

The Department of Homeland Security (DHS) has submitted a report to Congress detailing current and emerging threats to the federal government’s use of mobile devices. The report recommended security improvements within the “mobile device ecosystem.”

What's your app priority?

What's your app priority?

Applications are the key to end-user computing, but they haven’t always been the industry’s focus. Security fears around BYOD and the consumerization of IT put the spotlight on mobile device management and, later, EMM. And the flood of major software vendors into that market kept our attention there for much of the past decade.

Improve mobile app security by turning it into code

Improve mobile app security by turning it into code

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong. Far more than any one person can be expert in. It's unfair to think that a software developer, who is already supposed to be expert in all the latest software languages, frameworks and best practices, should also be keeping up with application security.

DHS-Led Study Recommends Ways to Boost Mobile Device Security in Public Sector

DHS-Led Study Recommends Ways to Boost Mobile Device Security in Public Sector

A study led by the Department of Homeland Security‘s science and technology directorate has offered recommendations for the federal government to manage the security of mobile devices being used by agency employees.

The phishing swindle that conned $100 million out of Google and Facebook

The phishing swindle that conned $100 million out of Google and Facebook

Imagine this. You work in the finance department of a large US-based company. You have a number of manufacturers and service providers based around the world who you regularly do business with. It’s not unusual for you to receive invoices from the companies for the services or goods that they have supplied to your firm.

An Obscure App Flaw Creates Backdoors In Millions of Smartphones

An Obscure App Flaw Creates Backdoors In Millions of Smartphones

FOR HACKERS, SCANNING for an open “port”—a responsive, potentially vulnerable internet connection on a would-be victim’s machine—has long been one of the most basic ways to gain a foothold in a target company or agency. As it turns out, thanks to a few popular but rarely studied apps, plenty of smartphones have open ports, too. And those little-considered connections can just as easily give hackers access to tens of millions of Android devices.

Best practices for mobile app testing automation

Best practices for mobile app testing automation

As the number of global smartphone users increases dramatically, the number of mobile apps is also skyrocketing. Already, Apple’s App Store has nearly 2 million apps for sale, while Google Play offers 2.2 million apps for download...

Google Turns Back On Traditional Enterprise Mobility Security

Google Turns Back On Traditional Enterprise Mobility Security

Some 61,000 employees across the globe are using Google-powered mobile devices at the workplace, said Google, which outlined its approach to mobile security in a new white paper.

Reports Thursday (April 20) highlighted a company blog post by the tech conglomerate detailing the three tiers of enterprise mobility security Google deploys to safeguard those employees and employer data.

Uber cloaked its spying and all it got from Apple was a slap on the wrist

Uber cloaked its spying and all it got from Apple was a slap on the wrist

Uber hid its fingerprinting of iPhone users from Apple – techniques that would have had any other app thrown out of Apple's store. Uber retained the information even after the Uber app had been deleted and the phone had been wiped. Uber CEO Travis Kalanick got a personal reprimand from Apple CEO Tim Cook, but the app stayed put, and Uber continues to use fingerprinting worldwide.