
Banking Trojans: mobile’s major cyberthreat
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
253 articles
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
With all of the security improvements, criminals find and exploit various ways of circumventing them to deliver their malicious creations to end-users’ phones, which puts at risk both the device owners and the businesses they are involved with.
Which brain mechanisms are in charge of our memory? Kaspersky Lab analyzed why we forget information stored on our devices.
Tech journalists Chris Brook and Brian Donohue discuss Google I/O, the IRS and Carefirst BlueCross BlueShield Data Breach in this Talk Security podcast.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
With an increasing amount of people using mobile devices for work, security of the data stored therein has become a hot topic. And since people also use mobile devices to access their finances, that makes them a prime target for cybercriminals. Android is the most popular mobile OS in the world right now, and the most targeted. How are users attacked and what is the current security status of Android?
While surfing the Internet, children may come across web pages containing inappropriate information. IT solutions can help protect children from such content.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Children who use mobile devices can be more vulnerable to cyber threats because they are free to surf the Internet at any time or place, without adult supervision.
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of his Facebook Messenger
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform
Let’s identify the main IT security and protection trends at MWC 2015.
Find out about the most interesting gadgets presented at the Mobile World Congress 2015 in Barcelona
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?