When the researchers set DIALDroid loose on the 100,206 most downloaded Android apps, they turned up nearly 23,500 app pairs that leak data. More than 16,700 of those pairs also involved privilege escalation, which means the second app received a type of sensitive information that it's typically forbidden from accessing.
Topic: Mobile Security
The House of Representatives will begin protecting the mobile devices of members of Congress and staff from cyber threats, the Office of the Chief Administrative Officer confirmed on Wednesday, through a new contract with Lookout Mobile.
You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices are increasingly at risk from "side-channel" attacks, where an intruder can bypass traditional network entry points and use another way to compromise the device.
Android users, the Mediaserver is still in the spotlight with Critical and High vulnerabilities this month. But the Media server is not the only issue at hand-in fact, this month there are eight critical flaws. Let's look at the critical flaws that are detailed in the February 2017 Android Security Bulletin.
If you think clearing your web browsing history on your iPhone or Mac is going to make your online habits permanently disappear, you'd be wrong. Very wrong. According to the CEO of Russian hacking tool creator Elcomsoft, Apple is storing Safari histories in the iCloud going back more than a year, possibly much longer, even where the user has asked for them
An alarming number of Android VPNs are providing a decidedly false sense of security to users, especially those living in areas where communication is censored or technology is crucial to the privacy and physical security.
Physical keys are supposed to be more effective than mobile apps and SMS verification, because there's no chance of phishing or man-in-the-middle attacks.
Preying on the popularity of mobile games for distribution isn’t something new for Trojans.
Kryptowire has identified several models of Android mobile devices that contained firmware that collected sensitive personal data about their users and transmitted this sensitive data to third-party servers without disclosure or the users' consent.
Mobile security continues to be in the cybersecurity spotlight. This follow-up focuses on mobile security trends, how the attack landscape has evolved, and what the average individual or organization can do to avoid the common pitfalls.