The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
SecTor - Canada's IT Security Conference Oct 23-26 - Learn More
Anatomy of a Data Breach - A Dark Reading June 22 Event
Webinars
Next-Generation Supply Chain Security
Jun 07, 2023
Here's What Zero Trust Really Means
Jun 13, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Mobile
Breaking news, news analysis, and expert commentary on cyber threats to mobile devices and the tools & technologies to protect them.
PyPI's 2FA Requirements Don't Go Far Enough, Researchers Say
The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.
June 02, 2023
The Python Package Index will require developers to better secure their accounts as cyberattacks ramp up, but protecting the software supply chain will take more than that.
by Tara Seals, Managing Editor, News, Dark Reading
June 02, 2023
4 MIN READ
Article
'PostalFurious' SMS Attacks Target UAE Citizens for Data Theft
SMS campaigns targeting members of the public in the United Arab Emirates have been detected.
June 02, 2023
SMS campaigns targeting members of the public in the United Arab Emirates have been detected.
by Dan Raywood, Senior Editor, Dark Reading
June 02, 2023
2 MIN READ
Article
Apple Zero-Days, iMessage Used in 4-Year, Ongoing Spying Effort
Russia's FSB intelligence agency says the zero-click attacks range far beyond Kaspersky, and it has blamed them on the United States' NSA. Those allegations are thus far uncorroborated.
June 02, 2023
Russia's FSB intelligence agency says the zero-click attacks range far beyond Kaspersky, and it has blamed them on the United States' NSA. Those allegations are thus far uncorroborated.
by Jai Vijayan, Contributing Writer, Dark Reading
June 02, 2023
5 MIN READ
Article
Biometric Bypass: BrutePrint Makes Short Work of Fingerprint Security
Bugs in the biometric protections on Android phones and iPhones allow the limit on the number of tries to unlock the devices with a fingerprint can be bypassed, allowing automated brute-force attacks.
June 01, 2023
Bugs in the biometric protections on Android phones and iPhones allow the limit on the number of tries to unlock the devices with a fingerprint can be bypassed, allowing automated brute-force attacks.
by Robert Lemos, Contributing Writer, Dark Reading
June 01, 2023
4 MIN READ
Article
Can Cloud Services Encourage Better Login Security? Netflix's Accidental Model
Netflix's unpopular password-sharing policy change had a positive cybersecurity silver lining. Can more B2C service providers nudge their users toward secure authentication?
May 31, 2023
Netflix's unpopular password-sharing policy change had a positive cybersecurity silver lining. Can more B2C service providers nudge their users toward secure authentication?
by Nate Nelson, Contributing Writer, Dark Reading
May 31, 2023
4 MIN READ
Article
421M Spyware Apps Downloaded Through Google Play
A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data.
May 30, 2023
A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data.
by Dark Reading Staff, Dark Reading
May 30, 2023
2 MIN READ
Article
Appdome Launches Build-to-Test, Automated Testing Option for Protected Mobile Apps
New capability streamlines automated testing of cybersecurity and anti-fraud features in android and iOS apps in virtual and cloud testing suites.
May 24, 2023
New capability streamlines automated testing of cybersecurity and anti-fraud features in android and iOS apps in virtual and cloud testing suites.
May 24, 2023
3 MIN READ
Article
ActZero Teams Up With UScellular to Secure Mobile Devices From Ransomware Attacks
AI-powered cyber defense service protects against phishing attacks for businesses on unlimited handset plans.
May 18, 2023
AI-powered cyber defense service protects against phishing attacks for businesses on unlimited handset plans.
May 18, 2023
2 MIN READ
Article
Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise
Lemon Group's Guerrilla malware model an example of how threat actors are monetizing compromised Android devices, researchers say.
May 17, 2023
Lemon Group's Guerrilla malware model an example of how threat actors are monetizing compromised Android devices, researchers say.
by Jai Vijayan, Contributing Writer, Dark Reading
May 17, 2023
5 MIN READ
Article
Houthi-Backed Spyware Effort Targets Yemen Aid Workers
Pro-Houthi OilAlpha uses spoofed Android apps to monitor victims across the Arab peninsula working to bring stability to Yemen.
May 17, 2023
Pro-Houthi OilAlpha uses spoofed Android apps to monitor victims across the Arab peninsula working to bring stability to Yemen.
by Dark Reading Staff, Dark Reading
May 17, 2023
1 MIN READ
Article
Apple Boots a Half-Million Developers From Official App Store
The mobile phone and MacBook giant also rejected nearly 1.7 million app submissions last year in an effort to root out malware and fraud.
May 17, 2023
The mobile phone and MacBook giant also rejected nearly 1.7 million app submissions last year in an effort to root out malware and fraud.
by Tara Seals, Managing Editor, News, Dark Reading
May 17, 2023
2 MIN READ
Article
Name That Toon: One by One
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
May 16, 2023
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
May 16, 2023
1 MIN READ
Article
'Very Noisy': For the Black Hat NOC, It's All Malicious Traffic All the Time
Black Hat Asia's NOC team gives a look inside what's really happening on the cyberfront during these events.
May 12, 2023
Black Hat Asia's NOC team gives a look inside what's really happening on the cyberfront during these events.
by Tara Seals, Managing Editor, News, Dark Reading
May 12, 2023
5 MIN READ
Article
Google Bans Thousands of Play Store Developer Accounts to Block Malware
Last year, Google banned 173,000 developer accounts and prevented 1.5 million apps from reaching the Play Store as it fought policy violations and malware.
April 28, 2023
Last year, Google banned 173,000 developer accounts and prevented 1.5 million apps from reaching the Play Store as it fought policy violations and malware.
by Nathan Eddy, Contributing Writer, Dark Reading
April 28, 2023
3 MIN READ
Article
Global Spyware Attacks Spotted Against Both New & Old iPhones
Campaigns that wielded NSO Group's Pegasus against high-risk users over a six-month period demonstrate the growing sophistication and relentless nature of spyware actors.
April 20, 2023
Campaigns that wielded NSO Group's Pegasus against high-risk users over a six-month period demonstrate the growing sophistication and relentless nature of spyware actors.
by Elizabeth Montalbano, Contributor, Dark Reading
April 20, 2023
5 MIN READ
Article