Mobile Security

Google to add permission controls in upcoming Android M

At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.

ESET uncovers another porn clicker on Google Play

Porn clickers pretending to be the the Dubsmash application have found their way back onto Google Play, a month after being removed.

Hackers could track subway users via phone accelerometer data

Researchers from Nanjing University have found a way in which hackers could track a smartphone user on the subway – even when limited reception is available.

5 signs that an app could be risky

Not all apps are worth your time and money. We Live Security looks at five signs the app you’re about to download could be risky, and worth investigating further.

No iOS Zone, the vulnerability that enables DoS attacks on Apple devices

Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.

Smartphone Authentication: the Passing of the Passcode?

Smartphone authentication: is biometric technology ready to replace PINs and passwords?

Samsung Galaxy S5 could be open to fingerprint theft

The Samsung Galaxy S5 and other ‘unnamed Android devices’ are vulnerable to having the fingerprints they use for authentication cloned by hackers, reports Gizmodo.

1,500 iOS apps open to simple man-in-the-middle attacks

Around 1,500 apps for iPhone and iPad contain an HTTPS vulnerability making it ‘trivial’ for hackers to perform man-in-the-middle attacks to steal passwords, bank details and other private information.

How secure is your smartwatch?

Last week’s Apple Watch launch has put the spotlight back on the ‘smart’ inter-connected watches that are expected to change how we interact with each other and the internet. But how secure are they?

Mobile security: IBM/Ponemon study finds enterprise app security weaknesses

Nearly 40 percent of large companies – including a significant number in the Fortune 500 – are not taking necessary precautions to secure the apps that they’re providing their customers.

America is the leading developer of “risky mobile apps”, claims report

A survey of more than a million apps on the Google Play and iOS App Store has found that more than 40 percent of ‘risky mobile’ apps originate from the United States

Google announces ‘Vulnerability Research Grants’

Google has announced it is to pay out research grants to security researchers seeking out potential bugs, even if they turn up empty-handed, reports ZDNet.

Are you being tracked? How to spot a tracking app on your phone

Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.

Android Wi-Fi Direct bug means hackers can reboot your device

A vulnerability in Android’s Wi-Fi Direct functionality has been uncovered by security researchers.

‘Critical Security Updates’ cancelled for 939 million Android users

Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software

Mobile security: flaw allows hackers to read texts and listen to calls

Hackers can eavesdrop on your phone calls and text messages even with cell networks using “the most advanced encryption available” according to The Washington Post.

Android scam: Firms fined over $500,000 for malicious apps’ hidden subscriptions

Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.

Phone biometric security need to be controlled, says ex-GCHQ chief

The former head of the UK’s government’s communications agency GCHQ has issued warnings over the privacy of the biometric security increasingly favored in top-end mobile phones and other devices, Computing reports.

Nexus 5, Galaxy S5 and iPhone 5s hacked at Pwn2Own event

The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the Mobile Pwn2Own hacking competition, reports Forbes.

Apple Pay and security – what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments – both from Apple’s own system, and rivals playing catch-up.

Follow us

Copyright © 2015 ESET, All Rights Reserved.