Tag: Mobile Security
You are here: Home \ Mobile Security \ Page 3
Cyberattackers have used a bogus mobile device management (MDM) system to target a small – but presumably high-value – set of iPhones in India in a cyberespionage campaign that has some unusual hallmarks.
In this InfoSec Insider, Tim Bandos looks at why network admins will want to keep a close watch on network traffic within the enterprise.
Researchers released a workaround for Apple’s USB Restricted Mode security feature the same day it was rolled out.
The fitness app Polar Flow exposes the whereabouts of some of its high-profile users, including “spies” and those with sensitive positions in the military.
A massive breach has impacted up to 21 million users’ personal data and their social media “access tokens.”
The July Android Security bulletin tackles 44 vulnerabilities in all, with the bulk rated high in severity.
Some mobile apps can take and share screenshots and video of the phones’ app activity without users’ knowledge.
After users complained online that their Galaxy devices are randomly sending photos to contacts, Samsung said it isn’t a hardware or software issue.
The attack allows malicious applications to break out of their sandbox and access the entire operating system, giving an adversary complete control of the targeted device.
The attack allows malicious applications to break out of their sandbox and access the entire operating system, giving an adversary complete control of the targeted device.
123456789 ... 18 ... 27 ... 36 ...