Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
Twitter debuts a grand but simple plan to replace passwords where your phone number is your username and an SMS-generated code is your password.
Google's mobile operating system joins Apple's iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
One simple Android game can get as much information about the smartphone’s owner as a real spy can.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
According to research by Kaspersky Lab, 22 percent of phishing scams on the web target Facebook.
Discussing security and the privacy strengths and weaknesses in the Apple’s soon-to-be-released iOS 8.
Data breaches seemed to dominate the security news in May, but mobile ransomware emerged as well and there was good and bad privacy news from the tech giants.
Android devices store data on the SD card and the internal space where apps are kept.