BYOD is widely accepted because of the significant cost reduction that it brings. Unfortunately, it also has downsides, the biggest of which are the security risks business-critical information is exposed to.
A year ago, we predicted that boundaries will be blurred when it comes to cybercrime and targeted attacks. With the steady rise of consumerization in the workplace, mobile devices will increasingly be abused to get to an attacker's target.
An Android Trojan app called PowerOffHijack, which originated from Chinese app stores, was found tricking users into believing that their devices were turned off though they're actually powered on.
This research paper provides in-depth information on the operation and structure of a cybercriminal group found using fake banking apps to steal mobile banking credentials from South Korean users.
Trend Micro researchers have discovered two spyware apps that are designed to work on iOS 7, with functions that allow it to gather data, as well as start voice recordings in the background.
While BYOD introduces a flexible workplace for employees, it could also act as a gateway to various attacks. In this video, Trend Micro CTO Raimund Genes proposes a solution to the BYOD problem.
A look at the notable mobile threats and trends that affected Android and iOS platforms during the second half of 2014: the growth of mobile malware, the top mobile threats, and more.