Security News
![Cybercriminals set sights on bot attacks and mobile apps](/static/build/img/news/alt/phishing-stats-2-small.jpg)
The past six months have seen a 13% increase in human-initiated cyberattacks. Here's what cybercriminals are targeting.
![Simjacker: SIM Card Attack Used to Spy on Mobile Phone Users](/static/build/img/news/alt/data-breach-stats-small.jpg)
Researchers at AdaptiveMobile Security, a firm that specializes in cyber telecoms security, have disclosed a new SIM card attack method that could work against over 1 billion mobile phones, and...
![1B Mobile Users Vulnerable to Ongoing ‘SimJacker’ Surveillance Attack](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn.
![Simjacker vulnerability actively exploited to track, spy on mobile phone owners](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being used for targeted...
![SyncDog partners with Symantec to address full spectrum of mobile security concerns](/static/build/img/news/alt/application-stats-small.jpg)
SyncDog, the leading Independent Software Vendor (ISV) for next generation mobile security and data loss prevention, announced their partnership with the world’s leading cyber security company,...
![Analysis: Report on China Attacking Mobile Devices](/static/build/img/news/alt/cost-stats-small.jpg)
This week's ISMG Security Report takes a close look at whether an iPhone hacking campaign may be linked to Android spying campaigns by China. Plus: Do ransomware gangs target organizations that...
![Web/Mobile App Security: What's 'Good Enough?'](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Paul Dant of Arxan on Measuring Application DefensesHow do organizations know if their app and network security is sufficient to protect them from data breaches - or if their defenses are even...
![Samsung launches Exynos 980, a 5G-integrated mobile processor](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Samsung Electronics, a world leader in advanced semiconductor technology, announced its latest mobile processor, the Exynos 980, which combines best-in-class connectivity with an integrated 5G...
![TrickBot Targets Verizon, T-Mobile, Sprint Users to Siphon PINs](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
![Building a Mobile Defense: 5 Key Questions to Ask](/static/build/img/news/alt/application-stats-small.jpg)
Willie Sutton and mobile attackers have much in common -- but defenses have evolved since the famous bank robber had his heyday.