Security News

Researchers launched a Proof-of-Concept attack on two Android mobile phones and an embedded system board.

The Australian government wants to force companies to help it get at suspected criminals’ data. If they can’t, it would jail people for up to a decade if they refuse to unlock their phones.

Last month the crooks were throwing old passwords into their scams to make you sit up and take notice. Now it's phone numbers.

Security researchers at Check Point Software Technologies have discovered a new attack vector against the Android operating system that could potentially allow attackers to silently infect your...

Sloppy Android developers not following security guidelines for external storage opens the door to device takeover and more.

Kryptowire discovered vulnerabilities in mobile device firmware and pre-installed mobile apps that pose a risk for the mobile phone supply chain because they can expose consumer and enterprise...

Thousands of mobes allegedly slurped, fenced via phishing, etc A dozen people have been indicted in America for allegedly fencing more than $1m in smartphones and other kit obtained via hacking and fraud.…

Mobile ballots dubbed 'horrific', blockchain reliance questioned The US state of West Virginia plans to allow some of its citizens to vote in this year's midterm elections via a smartphone app –...

Ding! Ding! Round three in blanket spying bout Analysis A fight has begun over another of the US government's mass surveillance systems – with two Senators raising questions about an unusual data...

Workspaces' time machine promises to make quick work of extortionists Black Hat While ransomware continues to extort factories, hospitals, schools, businesses, and ordinary netizens, BlackBerry...