Mobile & Wireless
Civil rights lawyers and Democratic senators are pushing for legislation that would limit U.S. law enforcement agencies’ ability to buy cellphone tracking tools to...
Hi, what are you looking for?
It’s time for enterprises to stop treating unmanaged devices as an edge case and start securing them as part of a unified Zero Trust...
Civil rights lawyers and Democratic senators are pushing for legislation that would limit U.S. law enforcement agencies’ ability to buy cellphone tracking tools to...
Endpoint detection and response pioneer CrowdStrike is elbowing its way into new security markets with a planned acquisition of attack surface management startup Reposify...
Ride-hailing giant Uber is moving quickly to downplay the impact from a devastating security breach that included the theft of employee credentials, access to...
The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have published guidance on implementing an Open Radio Access Network (RAN)...
LTE and 5G network security firm OneLayer has announced a $6.5 million equity investment from Koch Disruptive Technologies (KDT), the VC arm of Koch...
Mobile phishing protection startup novoShield has emerged from stealth mode with an enterprise-grade iPhone protection application.The new solution, novoShield says, was designed to protect...
Researchers have discovered two potentially serious vulnerabilities in wireless LAN devices that they say are often used in airplanes.
Apple this week has started rolling out iOS 16 with several security and privacy improvements meant to keep users protected from malware, state-sponsored attackers,...
Apple’s security response engine revved into high gear Monday with patches for security defects in a wide range of products, including fixes for a...
Google’s September 2022 security update for Pixel devices addresses two critical vulnerabilities. A total of 46 other security flaws were resolved in the Android...
Cymulate, a late-stage Israeli startup in the breach and attack simulation space, has closed a $70 million Series D funding round led by existing...
Symantec has discovered hardcoded AWS credentials in more than 1,800 mobile applications and warned of the potential risks associated with poor security practices.While Symantec’s...
Apple on Wednesday started shipping patches for older iPhone and iPad devices to address a recent, actively exploited vulnerability.Tracked as CVE-2022-32893, the vulnerability impacts...
Trend Micro’s Zero Day Initiative (ZDI) has announced the targets and prizes for its next Pwn2Own hacking competition, as well as the introduction of...
Password management software firm LastPass has suffered a data breach that led to the theft of source code and proprietary technical information.
Leaked documents appear to show a little-known spyware company offering services that include Android and iOS device exploits for €8 million (roughly $8 million).
A researcher from the Ben-Gurion University of the Negev in Israel has shown how a threat actor could stealthily exfiltrate data from air-gapped computers...
Russian cybersecurity firm Doctor Web has identified multiple backdoors on the system partitions of several Android devices that are counterfeit versions of popular phones.
A researcher has conducted an analysis to see how major companies could track user activity through their mobile in-app browsers, and released a free...
Apple on Wednesday rolled out emergency patches for a pair of already exploited zero-day vulnerabilities in its flagship macOS and iOS platforms.Apple confirmed in-the-wild...