Security researchers discovered two malicious Android apps that leveraged a clever 2FA bypass technique to steal Turkish users' cryptocurrency credentials.
Security researchers observed a new variant of XLoader masquerading as Android security apps and an iOS configuration profile to target mobile users.
One of the best ways for cybercriminals to deliver a payload on your organization's network is to smuggle it inside your employees' mobile apps.
Over 20 mobile apps commonly used for stock trading are not very secure, according to recent security research.
Shadow IT is still a challenge for organizations. Security leaders should provide users with the tools they need and monitor unsanctioned use carefully.
As smartphone use skyrockets in India, so does the threat of cyberattacks against Indian government agencies, banks, businesses and individual users.
Mobile apps are being pushed out at a rapid pace, which places a lot of pressure on security teams to develop fast-acting and comprehensive strategies.
Harvard, MIT and Carnegie Mellon teamed up to show just how much of users' personal information is shared by smartphone applications.
Enterprises need to enact a comprehensive mobile security strategy to safeguard their assets and IPs against malicious mobile apps.
Enhancing mobile application security doesn't have to take endless time and resources. Catch up on 10 ways you can improve your security knowledge.