According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.
Security researchers revealed that two mobile malware threats, Xloader and FakeSpy, may have been developed and launched by the same cybercriminal group.
The TimpDoor malware family enables cybercriminals to turn infected Android devices into network proxies without users' knowledge.
As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?
In July 2018, Researches reported three fake Android banking apps that phished for users' credit card details and leaked them online by transferring them to an exposed server.
An unknown threat actor leaked the source code for the Android malware Exobot, leading to fears of an impending attack similar to the massive DDoS incident that hit domain name provider Dyn in 2016.
As the mobile threat landscape has expanded over the past decade, Apple's iOS releases have added new MDM features to help security professionals protect enterprise networks.
A decades-old mobile security flaw resurfaced in recent weeks after a U.S. senator reported that cybercriminals exploited the Signaling System 7 (SS7) protocol to breach a mobile carrier.
Cisco's "2018 Annual Cybersecurity Report" found that burst attacks, cryptoworms and mobile threats are among security professionals' top concerns in 2018.
A group of researchers discovered a flaw in the protocol used in telecommunications networks that could enable fraudsters to pursue at least 10 different types of 4G LTE attacks.