McAfee Launches Whitelisting Solution for Android-Based Embedded Systems

McAfee Launches Whitelisting Solution for Android-Based Embedded Systems

The application offers a higher level of protection because it resides in the kernel

Pop-Up Browser Flaw Allows Hackers to Bypass Lock Screen on Samsung Phones – Video

Pop-Up Browser Flaw Allows Hackers to Bypass Lock Screen on Samsung Phones – Video

Samsung Galaxy S III and Note II are known to be affected

F-Secure Launches Safe Avenue Multi-Device Offering

F-Secure Launches Safe Avenue Multi-Device Offering

Safe Avenue has benefits for both consumers and operators

Commtouch Report: 178,246 Pieces of Android Malware Collected in January 2013

Commtouch Report: 178,246 Pieces of Android Malware Collected in January 2013

The company has released its February 2013 Internet Threats Trend Report

MWC 2013: “Hackers” Protest Against Kaspersky – Video

MWC 2013: “Hackers” Protest Against Kaspersky – Video

The security firm has come up with a clever way to advertise its products

MWC 2013: General Dynamics Demos GD Protected Software on LG Optimus 3D Max

MWC 2013: General Dynamics Demos GD Protected Software on LG Optimus 3D Max

The defense contractor promises highly secure mobile devices

In 2012, Trend Micro Identified 4,000 Phishing URLs Designed for Mobile Web

In 2012, Trend Micro Identified 4,000 Phishing URLs Designed for Mobile Web

Most of the malicious sites replicated the ones of financial institutions

Symantec and G&D Team Up to Develop Protected Mobile Security Applications

Symantec and G&D Team Up to Develop Protected Mobile Security Applications

Symantec's products will leverage the Trusted Execution Environment

AVG Provides Three Quick Tips to Protect Your Devices During the Winter Break

AVG Provides Three Quick Tips to Protect Your Devices During the Winter Break

Passwords, anti-theft and safe browsing are the key to a peaceful vacation

Defense Contractor BAE and Vodafone Enter Cybersecurity Partnership

Defense Contractor BAE and Vodafone Enter Cybersecurity Partnership

The first order of business is the Vodafone Mobile Threat Manager

Data from the RAM of Android Devices Can Be Read by Putting Them in the Freezer

Data from the RAM of Android Devices Can Be Read by Putting Them in the Freezer

Researchers from the Erlangen University have developed an attack called FROST

Spammers Use Tool to Harvest Phone Numbers

Spammers Use Tool to Harvest Phone Numbers

Webroot experts have analyzed the latest version of the application

Malware Served on Google Play Jumps from the Smartphone to the PC

Malware Served on Google Play Jumps from the Smartphone to the PC

Kaspersky experts have analyzed this particular backdoor

All You Need to Know About Managing Your Mobile Privacy – Infographic

All You Need to Know About Managing Your Mobile Privacy – Infographic

Mobile malware isn't the only thing you should be concerned about

Kaspersky Launches Endpoint Security for Business

Kaspersky Launches Endpoint Security for Business

The security firm has released its new flagship product for enterprises

Cybercriminals Compromise Legitimate Websites to Distribute SMS Trojans

Cybercriminals Compromise Legitimate Websites to Distribute SMS Trojans

Experts from security firm Webroot have analyzed this campaign

Security Experts Warn About Fake “Temple Run 2” for Android

Security Experts Warn About Fake “Temple Run 2” for Android

As the release date draws near, malicious versions will likely appear

 
Want more? Browse: