A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS.
ZRTPCPP, an open-source library that's used by several applications offering end-to-end encrypted phone calls, contained three vulnerabilities that could have enabled arbitrary code execution and denial-of-service attacks, according to researchers fr...
Over three quarters of Android threats are malicious apps that send SMS messages to premium rate numbers and could be mitigated by a protection feature present in Android 4.2, according to researchers from networking vendor Juniper Networks.
Google is revealing some new numbers around malware and phishing attempts in an effort to get more people thinking about online security and to make the Web safer.
Edward Snowden, the former NSA contractor who leaked information about U.S. government mass surveillance programs, has been charged by the U.S. with espionage, the Washington Post reported Friday.
Bromium's small virtual machines have been updated to protect users who send documents or connect to public wireless hotspots when on the move.
A newly discovered Trojan program exploits previously unknown flaws in Android and borrows techniques from Windows malware in order to evade detection and achieve persistence on infected devices.
The first three months of 2013 have seen a surge in spam volume, as well as large numbers of samples of the Koobface social networking worm and master boot record (MBR) infecting malware, according to antivirus vendor McAfee.
Norwegian operator Telenor will use special software to ensure that all personal and sensitive content is deleted from smartphones and tablets handed in by users for recycling, a change it hopes will result in fewer customers holding on to their old ...
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure.
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy.
Samsung's Knox system for Android devices gets approval for use in government and military like the BlackBerry, once the gold standard
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday.
We all know that iMessage is encrypted, but US law enforcers have only just realised they can't intercept it. And in other news, the Department of Defense has detected weaknesses in the US army's mobile strategy.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser
Latest News Articles
- Twitter more than doubles its sales, stock soars
- BlackBerry focuses on security for the enterprise
- Oracle hits back at ex-employee's claims over in-memory database option
- Uber, Airbnb go after businesses
- Guns, vandals and thieves: Data shows US networks under attack
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
- Notebooks View all »
- 44% off $550
- $797.95 free shipping
- Tablets View all »
- Mobile Phones View all »
- TVs View all »
- Digital Cameras View all »