An anonymous user who claimed to be the author of Bilal Bot reached out to IBM via a Russian domain to set the record straight about the malware.
The IBM X-Force Application Security Research Team discovered a previously undocumented vulnerability in older versions of Nexus 5X's Android images.
Cybercriminals can easily compromise fitness bands that use Bluetooth 4.0 VLE due to limitations in the key exchange of its encryption protocol.
Quadrooter, a set of four privilege escalation vulnerabilities, allows attackers to access user data by exploiting flawed Qualcomm chips.
There's no such thing as a "free" app. What data are free mobile apps collecting, how is it used and what can companies do to protect themselves?
A firm can face a malware breach if its risk engine does not see every stage of an attack, as one bank recently discovered.
A new Tatanga Trojan recently emerged, which uses a MitB attack to bypass mobile security in bank transactions. The scam is commiting fraud in Germany.
Mobile users are reportedly more likely to succumb to phishing attacks based on the manner in which they access certain websites.