A new threat known as WinPot malware is using a slot machine-like interface to empty ATMs at targeted financial institutions.
Security researchers discovered a sample of clipper malware that targeted Android users by lurking in the Google Play store.
A good remote work policy covers a broad range of categories, from employment rules to expense reporting to legal obligations. But the data security provisions are probably the most important.
According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.
While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices.
IT decision-makers need to fast-track the EMM selection process to stay ahead of the evolving threat landscape and more effectively manage Android devices.
A new phone-based phishing scam reveals how fraudsters are devising more sophisticated schemes to prey on Apple device users.
Researchers at Malwarebytes observed two instances of pre-installed malware targeting critical applications on Android devices.
With blazing fast speeds and lower latency, will 5G technology mitigate or exacerbate existing network security concerns?
Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale.