iPhone hack allowed device takeover via Wi‑Fi
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds
Using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds
Attackers could have exploited the flaw to steal victims’ login credentials or install malware on their devices
Watch out for attacks attempting to take advantage of the lockdown-induced surge in mobile banking use
From the humble passcode to biometric authentication, there are quite a few options to lock your Android phone. But which of them are more secure than the others?
Hot on the heels of his research into an attack that attempted to take down ESET’s website, Lukas Stefanko sheds more light on threats posed by mobile botnets
Losing your smartphone can be expensive, but the cost of the device may not be the final price you’ll be paying
With World Backup Day upon us, we walk you through the ways to back up your iPhone or Android phone so that your personal information remains safe
Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the number of highly critical bugs reported increased.
Are you in the 26% of people who use one of these PIN codes to unlock their phones?
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year
Malware in the official Google store never stops appearing. For cybercriminals, sneaking their malicious applications into the marketplace of genuine apps is a huge victory.
While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.
Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets.
This short feature aims to draw attention to some of the key things you should be doing to bolster your tablet security to keep cybercriminals at bay.
What awaits us in terms of mobile security trends? Throughout this article, we will discuss how risks might develop in the near future.
ESET's Cameron Camp takes a closer look at security by design for mobile device manufacturers, assessing where we are and where we are heading.
At eight years old, Android is hugely popular. Both with users and attackers.
At the Google I/O event in San Francisco, the company announced a number of changes to its Android mobile operating system, including the option to deny any app individual permissions.
Porn clickers pretending to be the the Dubsmash application have found their way back onto Google Play, a month after being removed.
Researchers from Nanjing University have found a way in which hackers could track a smartphone user on the subway - even when limited reception is available.