Why Mobile Security Must Not Be Neglected
I was interested to read an article in V3 last week suggesting that smartphones and tablets are not primary targets for hackers. This suprised me, as whilst it can be argued that mobile threats may...
View ArticleFree standalone Android Apps #Fail
Recent articles about how free anti-malware apps for Android fall short of expectations through a targeted study come as no surprise. I’ve previously written a blog-entry of how I fell into a state of...
View ArticleKeeping The “Secure Channel” Secure
When we talk about “secure channel” we mean a HTTPS or SSL/TLS connection that is primarily used for high value sites such as banks and ecommerce sites. This type of connection is certificate-based,...
View ArticleJoin AdaptiveMobile at Mobile World Congress 2012
AdaptiveMobile, joined by a panel of leading industry experts, will share the very latest advances in mobile security, unveil the results of unique industry research into consumer security...
View ArticleThe Downside to Mobile Applications and Smartphones
The recent media attention to malicious applicationsand AdaptiveMobile’s recent Global Security Insights for Mobile research highlighted some of the downsides associated with mobile applications,...
View ArticleAdaptiveMobile shortlisted for 2012 Global Mobile Award
With just a couple of weeks until Mobile World Congress (MWC) 2012 the excitement is building amongst the team at AdaptiveMobile. Not only is this the first year that mobile security is taking centre...
View ArticleIn Machines We Trust - Getting the Security Ingredients Right
Last week featured the release of our 4th GSIM report, which covered the rise of Machine to Machine (M2M) communications within the mobile world. The report highlighted the growth of M2M...
View ArticleGovernment proposes nationwide porn filter, but what about the risks from...
A day after the launch of our GSIMV research, the government has announced plans to block undesirable online content, including porn, after it launched an official consultation today. AdaptiveMobile's...
View ArticleThe unchartered waters of NFC and mobile payments
A recent study shows that online bill payment and mobile payment services are dramatically increasing among Americans. News that will bring music to the ears of traditional and emerging companies...
View ArticleiPhone SMS Spoofing - Network or Phone Issue?
First some background: on Friday August the 17th a researcher by the name of pod2g released details of an exploit that affects Apple iPhone. Namely, it is possible for a user to specify the...
View ArticleSupport IWF Awareness Day
Today’s annual Awareness Day from the Internet Watch Foundation (IWF) concerns everyone. This is the one day in the year when internet users across the globe make a special effort to spread the word...
View ArticleGovernment proposes nationwide porn filter, but what about the risks from...
A day after the launch of our GSIMV research, the government has announced plans to block undesirable online content, including porn, after it launched an official consultation today. AdaptiveMobile's...
View ArticleSMS Spam - Coming in a Language near you
Over the Christmas period at least two countries (Ireland and New Zealand) experienced a single large Spam attack originating from numbers in US Networks. Most of the messages were typical Apple...
View ArticleRussian cyber criminals spreading Android toll fraud malware by SMS
MMS 9560 “I love you” fake MMS notification Android premium rate SMS Trojans (aka toll fraud) is nothing new in Russia but typically it is distributed via fake Android marketplaces or unofficial app...
View ArticleSMS Spam - Coming in a Language near you
Over the Christmas period at least two countries (Ireland and New Zealand) experienced a single large Spam attack originating from numbers in US Networks. Most of the messages were typical Apple...
View ArticleBank SMSishing attacks on rise in US - Part 1
At AdaptiveMobile we've seen a notable rise in the number of large scale bank SMShing attacks across the US. Cyber-thieves have stepped up their efforts in an operation to steal bank/credit card...
View ArticleBank SMSishing attacks on rise in US - Part 2
What Should You Be Looking For? These cybercriminals design each scam to look as close to the real thing as they can manage but they are often slightly different. Attackers prompt the recipient to...
View ArticleBank SMSishing attacks on rise in US - Part 2
What Should You Be Looking For? These cybercriminals design each scam to look as close to the real thing as they can manage but they are often slightly different. Attackers prompt the recipient to...
View ArticleBank SMSishing attacks on rise in US - Part 2
What Should You Be Looking For? These cybercriminals design each scam to look as close to the real thing as they can manage but they are often slightly different. Attackers prompt the recipient to...
View ArticleBlackhat 2013; The Good, the Bad and the Mobile
I attended Blackhat just over a week ago and have only now caught up with a huge backlog I left myself. It was my first time at this event, so I was interested to see what it had to offer. In the past...
View Article