
Does every iPhone spy on its owner, after all?
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
129 articles
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.
Our study during World Cup indicates one in four networks are dangerous and you must take care to avoid substantial loss.
How iOS 8 and Tizen releases affect smartphone market and security landscape.
Discussing security and the privacy strengths and weaknesses in the Apple’s soon-to-be-released iOS 8.
Adults can choose to face the financial consequences of their own actions, but they may want to know how to prevent their kids from running up exorbitant credit card bills tied to the parents’ iTunes or Google Play accounts.
App stores offer all the promise of a virtually unlimited range of games and tools, but are rife with pitfalls too. These include bad apps, ballooning costs, and malicious apps, particularly on Android devices.
New ransomware targets Apple users running iOS mobile and O SX Mac devices with a piece of malware that blocks use and demands payments.
But while Android’s market figures continue to pile up, so do the knocks against the company’s security protocols.
First ever SMS Android Trojan in U.S., update on OpenSSL Heartbleed, Apple fixes SSL vulnerability in iOS and OSX, AOL Hacked, and Iowa State Bitcoin Mining.
Last week, we had a look at private messengers; today, we decided to compile a list of good apps to protect you, your iPhone and its content.
Android devices store data on the SD card and the internal space where apps are kept.
Mobile malware is the hottest topic among cybercriminals and the number of malicious mobile apps is rapidly growing. The reason for that is obvious – there are multiple ways to
Spring is when we reboot our life cycles, paring down and cleaning up our lives in anticipation of bigger, better things to come with warmer weather – and there’s no
Late on a Friday afternoon in the middle of February Apple quietly issued a fix for a critical certificate validation bug in iOS that essentially could have given an attacker
Loyal Kaspersky Daily readers are already aware of the recent mobile security trends: the hottest topic among cybercriminals are mobile banking Trojans. When you do your banking on a smartphone,
A number of widely used iOS banking applications from some of the world’s most prominent banks contain bugs that expose users to data theft and account takeovers. Specifically, a knowledgeable
An apparent flaw in Apple’s new operating system for its mobile devices allows anyone to access a user’s contact information and social media accounts without entering the security code to
For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence as the
You may want to think twice about using your iPhone as a wireless hotspot. A group of researchers from the Department Informatik at Friedrich-Alexander-Universität Erlangen-Nürnberg in Germany developed software allowing