Security researchers at Zimperium zLabs found a vulnerability in the AirDroid app that could enable a cybercriminals to execute MitM attacks.
German researchers developed two methods for mitigating Rowhammer attacks, which exploit the physical hardware in dynamic random-access memory (DRAM).
Exaspy spyware, which infects Android phones to intercept text messages, emails and other communications, is available as a commodity service online.
October's mobile security news headlines covered startling statistics on public Wi-Fi use, mobile apps that leak location data and selfie authentication.
Researchers discovered a new version of banking Trojan GM Bot that enables cybercriminals to bypass security features included with Android Lollipop.
Address space layout randomization (ASLR) is a widely-used method that prevents memory corruption attacks by arranging the address space positions of key data areas in a random manner. This technique can be found in the security designs of many...
Just when it seems like malware-makers have reached the end of their ingenuity, a new Android Trojan asks users to take selfies while holding up their IDs.
Generally speaking, lockscreen ransomware ranks on the not-so-sophisticated end of the malware spectrum. As noted by Information Age, this type of ransomware can be a mere “nuisance” when confined to a single PC or laptop. When it comes...
September was another huge month for mobile security news. Headlines included new security features for Android devices and the launch of a $12,000 phone.
Windows Trojan DualToy, which had previously infected Windows PCs exclusively, branched out to attack Android and iOS devices connected to PCs via USB.