The biggest incidents in the first three months of 2015 showed that even the most security-savvy users and organizations are not immune to security threats. See how they affected established security measures in the live casino online 2015 1Q Security Roundup.
Security awareness is always the first step to digital safety. But what if cybercriminals used this sentiment to lure victims into downloading malware?
Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.
In an effort to prevent users from thinking that iOS 8 has exploitable flaws, Apple is reportedly cracking down on antimalware products in the iOS App Store. How will the move affect its users?
A large number of repackaged Android apps have been showing up in Chinese app stores pretending to be "free¡±, but they still cost the users through various ads and subscriptions to various premium SMS services.
Is your Android device updated? Here's a look into the different Android versions, the major flaws that affected them, and the new security features on the latest version.
A year ago, we predicted that boundaries will be blurred when it comes to cybercrime and targeted attacks. With the steady rise of consumerization in the workplace, mobile devices will increasingly be abused to get to an attacker's target.
An Android Trojan app called PowerOffHijack, which originated from Chinese app stores, was found tricking users into believing that their devices were turned off though they're actually powered on.