Mobile security


109 articles

Mobile Security

No iOS Zone, the vulnerability that enables DoS attacks on Apple devices

No iOS Zone, the vulnerability that enables DoS attacks on Apple devices

Mobile Security

No iOS Zone, the vulnerability that enables DoS attacks on Apple devices

Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.

Josep Albors06 May 2015


Mobile Security

Smartphone Authentication: the Passing of the Passcode?

Smartphone Authentication: the Passing of the Passcode?

Mobile Security

Smartphone Authentication: the Passing of the Passcode?

Smartphone authentication: is biometric technology ready to replace PINs and passwords?

David Harley06 May 2015


Mobile Security

Samsung Galaxy S5 could be open to fingerprint theft

Samsung Galaxy S5 could be open to fingerprint theft

Mobile Security

Samsung Galaxy S5 could be open to fingerprint theft

The Samsung Galaxy S5 and other 'unnamed Android devices' are vulnerable to having the fingerprints they use for authentication cloned by hackers, reports Gizmodo.

Alan Martin23 Apr 2015


Mobile Security

1,500 iOS apps open to simple man-in-the-middle attacks

1,500 iOS apps open to simple man-in-the-middle attacks

Mobile Security

1,500 iOS apps open to simple man-in-the-middle attacks

Around 1,500 apps for iPhone and iPad contain an HTTPS vulnerability making it 'trivial' for hackers to perform man-in-the-middle attacks to steal passwords, bank details and other private information.

Alan Martin21 Apr 2015


Mobile Security

How secure is your smartwatch?

How secure is your smartwatch?

Mobile Security

How secure is your smartwatch?

Last week’s Apple Watch launch has put the spotlight back on the ‘smart’ inter-connected watches that are expected to change how we interact with each other and the internet. But how secure are they?

Karl Thomas15 Apr 2015


Mobile Security

Mobile security: IBM/Ponemon study finds enterprise app security weaknesses

Mobile security: IBM/Ponemon study finds enterprise app security weaknesses

Mobile Security

Mobile security: IBM/Ponemon study finds enterprise app security weaknesses

Nearly 40 percent of large companies - including a significant number in the Fortune 500 - are not taking necessary precautions to secure the apps that they're providing their customers.

Alan Martin24 Mar 2015


Mobile Security

America is the leading developer of "risky mobile apps", claims report

America is the leading developer of "risky mobile apps", claims report

Mobile Security

America is the leading developer of "risky mobile apps", claims report

A survey of more than a million apps on the Google Play and iOS App Store has found that more than 40 percent of 'risky mobile' apps originate from the United States

Alan Martin05 Feb 2015


Mobile Security

Google announces 'Vulnerability Research Grants'

Google announces 'Vulnerability Research Grants'

Mobile Security

Google announces 'Vulnerability Research Grants'

Google has announced it is to pay out research grants to security researchers seeking out potential bugs, even if they turn up empty-handed, reports ZDNet.

Alan Martin02 Feb 2015


How To, Privacy, Mobile Security

Are you being tracked? How to spot a tracking app on your phone

Are you being tracked? How to spot a tracking app on your phone

How To, Privacy, Mobile Security

Are you being tracked? How to spot a tracking app on your phone

Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.

Editor29 Jan 2015