A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give attackers access to Google accounts, a security researcher has revealed.
Businesses more interested in controlling which apps are installed on the phones, and separating corporate data from users' personal data
An increasing number of Android phones are infected with mobile malware programs that are able to turn the handsets into spying devices, according to a report from Kindsight Security Labs, a subsidiary of telecommunications equipment vendor Alcatel-L...
Google quickly addressed a mega flaw in its Android mobile operating system after security researchers brought it to the company's attention earlier this month, but those fixes appear to be slow in reaching handset owners.
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Peter Sunde, the co-founder of BitTorrent search engine The Pirate Bay, is working on developing a secure mobile messaging app and service that's intended to be safe from government surveillance and be user friendly at the same time.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
China saw an increase in Trojan and botnet attacks coming from other countries in 2012, as the amount of mobile malware in the country also surged, according to a local security group.
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
ZRTPCPP, an open-source library that's used by several applications offering end-to-end encrypted phone calls, contained three vulnerabilities that could have enabled arbitrary code execution and denial-of-service attacks, according to researchers fr...
Over three quarters of Android threats are malicious apps that send SMS messages to premium rate numbers and could be mitigated by a protection feature present in Android 4.2, according to researchers from networking vendor Juniper Networks.
Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer.
Edward Snowden, the former NSA contractor who leaked information about U.S. government mass surveillance programs, has been charged by the U.S. with espionage, the Washington Post reported Friday.
Bromium's small virtual machines have been updated to protect users who send documents or connect to public wireless hotspots when on the move.
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices.
Most Popular Reviews
- 1 Microsoft Surface Pro 3 Windows 8.1 tablet
- 2 Samsung Galaxy Tab S (10.5) 4G review
- 3 LG G3 review
- 4 Nokia Lumia 930 review
- 5 Asus G550JK gaming notebook
Best Deals on GoodGearGuide
Latest News Articles
- FBI, Secret Service studying 'scope' of reported bank cyberattacks
- Retailers urged to defend against 'Backoff' point-of-sale malware
- HTC Desire 610 smartphone
- Round LG G Watch R has Plastic-OLED display, heart monitor and is waterproof
- IBM Watson now answers your questions before you ask
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTMarketing Communications Executive - B2BNSW
- FTInformation Services ManagerNZ
- FTSearch Account ManagerNSW
- FTChief Information OfficerNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTAccount Manager Programmatic Trading DeskNSW