Google has announced it is to pay out research grants to security researchers seeking out potential bugs, even if they turn up empty-handed, reports ZDNet.
Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.
A vulnerability in Android's Wi-Fi Direct functionality has been uncovered by security researchers.
Google has revealed that Android smartphones and tablets running versions of the software released before 4.3 (Jellybean) will no longer be given official updates to an important part of the software
Hackers can eavesdrop on your phone calls and text messages even with cell networks using "the most advanced encryption available" according to The Washington Post.
Three UK firms have been fined over $500,000 for a scam that involved Android apps signing up to a subscription service, and suppressing notifications informing the victim they were being charged, according to The Guardian.
The former head of the UK's government's communications agency GCHQ has issued warnings over the privacy of the biometric security increasingly favored in top-end mobile phones and other devices, Computing reports.
The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the Mobile Pwn2Own hacking competition, reports Forbes.
Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments - both from Apple’s own system, and rivals playing catch-up.
iOS and Android messaging app GroupMe has had a possible vulnerability fixed quickly by Microsoft, according to The Register. There was no evidence to suggest any cybercriminals had been able to exploit the flaw before it was patched.
One of the most popular and useful security functions of mobile handsets can be turned against the owner.
Google has outlined the enhanced security credentials of the upcoming Android 5.0 - nicknamed Lollipop - in an official blog post.
The latest version of Android, nicknamed Lollipop, will offer a new feature that could make stolen phones a whole lot less valuable to thieves: the ability to only allow factory resets when entering a password.
The latest version of the Apple iPad is due to be announced at an event later today, and according to Gizmodo, the Californian tech company are planning on bringing the fingerprint security system implemented in recent iPhones to its tablet market for the first time.
With Apple, Google and other tech companies responding to users’ demands for privacy with further smartphone encryption options, not everyone is happy. FBI Director James Comey is “very concerned” about increased mobile OS encryption, according to TechSpot.
Following the ground up overhaul of the BlackBerry operating system and accompanying launch of their new flagship smartphones last year, we wondered how they really stack up–security wise–against the other smartphones you might already have in your pocket or purse right now. How do new devices running Blackberry 10–as the new OS is called–compare to
It is now possible to enable HTTPS secure browsing on every website using Firefox for Android, the Electronic Frontier Foundation has announced.
BlackBerry has signed up to FIDO (Fast IDentity Online) Alliance – a group which is seeking to establish new methods to identify people quickly and safely, rather than relying on passwords for mobile security. FIDO is supported by internet giants such as Google and PayPal and is investigating alternative authentication technologies such as NFC chips, biometrics and one-time passwords, with a view to creating a standards-based system for passwordless authentication.
Summer is here and school is out, what better time to take a look at improving the cyber protection on all of your household's many digital devices?
A fake iPhone charger could be used to bypass the defenses of Apple's smartphone, three researchers from Georgia Tech have claimed. In an upcoming presentation at this summer’s Black Hat security conference in Las Vegas, the researchers claim to have created a “malicious charger” which can inject software into an iOS device in under a minute.