Are mobile payments and digital wallets safe? Are the apps safer than credit cards? What are the main risks? Here’s what to know.
Search results for: "mobile"
ESET malware researcher Lukas Stefanko gives us a peek behind the scenes of his analysis of CryCryptor ransomware and puts the threat into a broader context
Hot on the heels of his research into an attack that attempted to take down ESET’s website, Lukas Stefanko sheds more light on threats posed by mobile botnets
Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the number of highly critical bugs reported increased.
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year
If we look back at previous incarnations of mobile networks, 1G, 2G and so on, there have been major changes to the technology. The next generation, 5G, delivers greater speed and lower latency, but also has the advantage of being able to connect many more devices concurrently.
Only one in seven organizations have put in place all four basic cybersecurity practices specified by Verizon – changing all default passwords, encrypting data transmitted over public networks, granting employee access on a need-to-know basis, and testing security systems regularly.
Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.
It is clear today that our smartphones and tablets have evolved beyond this point, creating new means of technological interaction not previously imagined.
What awaits us in terms of mobile security trends? Throughout this article, we will discuss how risks might develop in the near future.
ESET's Cameron Camp takes a closer look at security by design for mobile device manufacturers, assessing where we are and where we are heading.
UK mobile company Three has fallen victim to a major data breach, with up to six million customers reported to have been affected.
As we continue to do more things with our smartphones, the threat posed by mobile malware increases. Here's a short history of its development.
T-Mobile Czech Republic has experienced a data leak, affecting 1.5 million of its customers, it has been claimed by local media.
Top tech organizations have been “ordered” to disclose their approach to security updates with mobile devices.
The Federal Bureau of Investigation has issued a public service announcement warning drivers that automobiles are “increasingly vulnerable” to cyberattacks.
In this feature we explore why mobile security is of the utmost importance for individuals and organizations. If smartphones and tablets not adequately protected, they are extremely vulnerable to being exploited.
Experian has revealed that information belonging to T-Mobile, which was housed on one of its servers, has been accessed by cybercriminals in a data breach.
Telco T-Mobile’s US arm received more data requests than its larger peers in 2014.
Customers are increasingly turning to mobile apps to make simple banking transactions, but a significant portion of those who don't bank on mobile devices cite security concerns as the reason.