Your Android phone will soon be able to auto-open apps when installation completes


When you install an app, the chances are that you’re going to want to fire up straight away. To help with this, Google is in the process of rolling out a handy auto-open feature to Android users.
If this sounds familiar, that is because it is something Google was spotted working on back in the second half of last year. You would have been forgiven for thinking that the company had forgotten about it, but the auto-open toggle is back.
Google Chrome address bar – are you a top or a bottom?


Across all platforms, Google Chrome remains one of the most popular – if not the most popular – web browser. But while the desktop version of the software is versatile, customizable and flexible, the same cannot be said of the mobile apps.
And this is why an announcement made by Google several weeks ago caused a flurry of excitement. On the face of things, the news that it would be possible to move the address bar from its familiar position at the top of the browser may not seem huge, but now that it is rolling out, it is becoming clear that it is actually pretty significant for Android users.
Millions of unsecured Wi-Fi networks are putting data at risk


New threat intelligence from Zimperium reveals over five million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025, with a staggering 33 percent of users still connecting to these open networks, putting enterprise data at risk in the process.
“Mobile devices are now a primary gateway to corporate data, but during travel, they’re also the most vulnerable,” says Kern Smith, VP of global solutions at Zimperium. “Unsecured Wi-Fi, phishing disguised as travel alerts, and risky sideloaded apps are creating an ideal attack surface for cybercriminals -- especially in peak travel months.”
Over half of employees fall for mobile phishing scams


A new report shows that security leaders have false confidence in their capabilities and employees when it comes to mobile security. While 96 percent are confident their employees can spot a phishing attempt, 58 percent have reported incidents where employees fell victim to executive impersonation scams via text message.
The study from Lookout, of more than 700 security leaders globally, underscores a critical need for organizations to rethink their cybersecurity strategies, particularly around the human-risk factors for social-engineering attacks.
Why we need to focus on mobile device security [Q&A]


When getting a new smartphone most people focus on features and pricing, while security tends to be overlooked. But as we access the internet more using mobile devices, protecting users' personal information, transactions, and digital identities is vital.
We talked to Tom Tovar, CEO of Appdome, to discuss why mobile security should be at the forefront of consumer and media conversations and why it's currently being neglected.
Google Wallet update means kids can now use digital payments and store their passes


Google is rolling out a significant update to Google Wallet that opens up the digital wallet to children.
The update enables children to not only make digital payments and use tap-to-pay, but also to store a range of passes, cards and tickets in one place. The consent of a parent or guardian is required to add a child’s card to Google Wallet, and there are comprehensive supervision tools available.
Mobile-first phishing attacks surge as specific capabilities are targeted


As organizations increasingly rely on mobile devices for business operations, including multi-factor authentication and mobile-first applications, mobile phishing poses a severe risk to enterprise security.
New research from Zimperium's zLabs shows a surge in mobile-focused attacks, dubbed 'mishing', activity peaking in August 2024 with over 1,000 daily attack records. These attacks are specifically designed to evade desktop security measures, executing only on mobile devices.
Mobile intelligence APIs open up visibility into enterprise mobile security data


Mobile and cloud security company Lookout is launching new Mobile Intelligence APIs integrating critical security data from mobile devices into the solutions already in use by enterprise security teams -- those like SIEM, SOAR, and XDR.
This is aimed at allowing security teams to identify cross-platform attacks, risky trends or abnormalities, and potential risks.
Amazon launches Amazon Haul in beta as a low-cost Temu alternative


Amazon may be one of the biggest names in online retail, but in recent years the likes of Temu has started to encroach on its territory by offering products at absurdly low prices.
Now Amazon has come up with a response. Amazon Haul is a new shopping experience that has launched in beta for US shoppers. Building on the Fulfillment by Amazon (FBA) service, Haul is home to “affordable fashion, home, lifestyle, electronics, and other products with ultra-low prices”. Most things are priced under $10, so what’s the catch?
Enterprises suffer surge in mobile phishing attacks


Cybercriminals are increasingly adopting a 'mobile-first' attack strategy to infiltrate enterprise systems by targeting weak, unsecured, and unmanaged mobile endpoints, recognizing mobile as a major entry point to corporate networks and sensitive data.
A new report from Zimperium zLabs shows a significant rise in mobile phishing -- or 'mishing' -- a technique that employs various tactics specifically designed to exploit vulnerabilities in mobile devices.
Nord Security launches eSIM for businesses


You probably already know about how eSIMs work and their advantages when travelling to different countries.
Of course this functionality is useful for businesses as well as individuals and Nord Security -- the company behind NordVPN -- is launching a new version of its Saily eSIM service aimed specifically at business users.
Enterprise mobile devices see increased attacks


A new report on the mobile threat landscape from Lookout reveals a 40.4 percent jump in mobile phishing attempts and malicious web attacks targeting enterprise organizations.
More than 80,000 malicious apps were detected on enterprise mobile devices. These threats can vary widely, from invasive permissions and riskware that pose significant compliance risks to sophisticated spyware capable of tracking devices, stealing data, eavesdropping on conversations and accessing the user' camera and microphone.
2024 Paris Olympics -- cybersecurity risks and top tips to keep data safe [Q&A]


In recent years, mobile devices have taken center stage and we've become mobile-first users, where mobile devices are our first choice for how we communicate, navigate, work, bank, take photos, shop and stay informed about the world around us. Our increased reliance on mobile phones is not without its risks.
According to Zimperium's Global Mobile Threat Report 2023, 43 percent of all compromised devices were fully exploited (not jailbroken or rooted), an increase of 187 percent year-over-year, a shocking number.
Why mobile connectivity is essential for the enterprise [Q&A]


While enterprise computing was once tied to the desktop, theses days mobile connectivity is essential to the smooth running of any business.
This is partly as a result of changed working patterns -- accelerated by the COVID pandemic -- and partly down to rapidly evolving technology. We spoke to Allwyn Sequeira, CEO of mobile cloud service Highway 9 Networks, to learn more about the enterprise mobile space.
Microsoft is making it possible to access your smartphone from File Explorer in Windows 11


The way Windows 11 interacts with mobile devices -- and, in turn, the way it lets users interact with them -- has been a little odd for some time. The Your Phone / Phone Link app showed that using Windows to use or browse your smartphone was really something of an afterthought for Microsoft.
Continuing the piecemeal approach to mobiles, it looks as though the company is finally about to give File Explorer the ability to browse smartphone contents. The option has been unearthed in Windows 11, although we don't yet know when it will be released properly.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.