Google to add permission controls in upcoming Android M
At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.
At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.
One of India's most popular music streaming services, Gaana, was pulled offline after a hack resulted in a leak of data affecting more than 10 million users.
In 2007, David Harley and Andrew Lee suggested at Virus Bulletin that poorly-designed phish quizzes did more harm than good. Has the picture changed much?
Irish businesses have been criticized for their IT security standards after it was revealed that a significant majority are not currently meeting the legal requirements.
An exploit has been discovered that causes iPhones and iPads to reboot when sent a string of malicious text.
Porn clickers pretending to be the the Dubsmash application have found their way back onto Google Play, a month after being removed.
Risk analysis is the first step towards managing risks, particularly when it comes to cyber risks. This recorded webinar introduces and explains key concepts, with links to several useful risk assessment tools.
Researchers from Nanjing University have found a way in which hackers could track a smartphone user on the subway - even when limited reception is available.
Customers are increasingly turning to mobile apps to make simple banking transactions, but a significant portion of those who don't bank on mobile devices cite security concerns as the reason.
The IRS has admitted that for more than two months malicious hackers targeted its systems, and managed to gain access to information about more than 100,000 tax payers.
Devices using Bluetooth Low Energy (BLE) to transmit their data can be intercepted by hackers, potentially exposing a trove of fitness data from wearables, IT Pro reports.
A malware family that primarily targets Linux-based consumer routers but that can infect other Linux-based embedded systems in its path: Dissecting Linux/Moose.
A new worm is infecting routers in order to commit social networking fraud, hijacking victims' internet connections in order to "like" posts and pages, "view" videos and "follow" other accounts.
Five reformed hackers who turned their lives around to help in the fight against cybercrime, leaving their blackhat past behind.
Security research is published in many forms. For example, there are live and recorded webinars that cover a range of cybersecurity topics.
A research paper from Google has looked into the difficulties of standard 'forgotten password' personal information verification.
Casual dating website 'Adult FriendFinder' has been hacked, leaking data from as many as 3.9 million accounts, according to an investigation by Channel 4 News.
A new update to the Apple Store app for iPhone and iPad has bolstered its security features, adding two-factor authentication (2FA) and increased Touch ID support.
Should you trust that link? We Live Security runs down five quick security questions to ask before you click on a URL.
ESET has discovered over 30 scareware apps available for download from the Google Play store. The apps have been installed by more than 600,000 Android users.