A look at the evolution of mobile threats in 2015 and some predictions for 2016
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Facebook will now let Google index the mobile app from the search engine.
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
Twitter debuts a grand but simple plan to replace passwords where your phone number is your username and an SMS-generated code is your password.
Google's mobile operating system joins Apple's iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
One simple Android game can get as much information about the smartphone’s owner as a real spy can.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.