Security researchers at Zimperium zLabs found a vulnerability in the AirDroid app that could enable a cybercriminals to execute MitM attacks.
German researchers developed two methods for mitigating Rowhammer attacks, which exploit the physical hardware in dynamic random-access memory (DRAM).
Researchers discovered a new version of banking Trojan GM Bot that enables cybercriminals to bypass security features included with Android Lollipop.
Just when it seems like malware-makers have reached the end of their ingenuity, a new Android Trojan asks users to take selfies while holding up their IDs.
Generally speaking, lockscreen ransomware ranks on the not-so-sophisticated end of the malware spectrum. As noted by Information Age, this type of ransomware can be a mere “nuisance” when confined to a single PC or laptop. When it comes...
September was another huge month for mobile security news. Headlines included new security features for Android devices and the launch of a $12,000 phone.
August saw many shifts in the mobile security landscape, including several new launches, threats and other snippets providing insight into upcoming trends.
Quadrooter, a set of four privilege escalation vulnerabilities, allows attackers to access user data by exploiting flawed Qualcomm chips.
It has been an eventful July for mobile security, with news regarding "Pokemon Go," smartwatches, IBM MaaS360's ISO 27001 certification and more.
The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi.