Articles about Mobile

Threats to mobile devices triple over the last year

Almost three times as many phishing, malicious, deny-listed, and offensive links have been delivered to mobile devices than a year ago, according to a new report from Lookout.

The Lookout Mobile Threat Landscape Report is based on data derived from the Lookout Security Cloud that analyzes data from more than 220 million devices, 325 million apps and billions of web items.

Continue reading

Privacy-focused mobile operating system /e/OS rolls out new version

If you have an Android phone you'll no doubt be aware of the risk that unwanted trackers can access your data while you're using third-party apps or browsing the web.

If you're worried about being tracked though there is an alternative in the form of /e/OS which has a focus on privacy and can be can be flashed on numerous Android devices to replace Google's ubiquitous OS. Today sees the release of V2 of /e/OS which offers further privacy controls, tools and improved user interface.

Continue reading

DDoS attacks shift from mobile to computers

DDoS attack

Computers and servers made up 92 percent of DDoS targets in 2013, compared to just eight percent for mobile devices. The split the previous year was 32 percent computers and 68 percent mobile. At the same time the DDoS attack count decreased 55 percent in 2023, but the average attack size grew 233 percent.

The latest DDoS trends report from Nexusguard also finds that shorter attacks lasting 90 minutes increased by 22 percent and made up 81 percent of all DDoS attacks.

Continue reading

Email still the most popular phishing technique even on mobile

mobile phishing

Most incidents of phishing or spoofing on smartphones still happen via email, according to MEF's (Mobile Ecosystem Forum) 9th Annual Trust Study.

The report shows 52 percent of users reporting personal experience of data harm via this channel. Surprisingly, 39 percent of those users still took no preventative measures to protect their online data.

Continue reading

Nearly half don't use mobile security solutions

A new report from Bitdefender shows that 45 percent of consumers don't use mobile security solutions, despite the fact that 78 percent conduct sensitive transactions on their devices.

Based on an independent global survey of over 7,000 consumers, the report looks at top security behaviors, practices and concerns across their digital footprint and lifestyle.

Continue reading

Keeper Security introduces passkey support for mobiles

Passkeys, cryptographic keys that lets users log in to accounts and apps without entering a password, have been around for a while but mostly on computers.

Now though Keeper Security has introduced passkey management support for both both Android and iOS mobile devices.

Continue reading

How the use of mobile devices is changing the cybersecurity landscape [Q&A]

As consumers and businesses undergo a sea change shift towards mobile interfaces, embracing everything from retail to human resources management, the landscape of mobile security is experiencing a parallel transformation.

With this surge in reliance on mobile devices, threats have become more sophisticated, spanning network vulnerabilities, the proliferation of malware, and the craftiness of phishing schemes.

Continue reading

21 new malware families for Mac systems discovered in 2023

Apple devices have historically had a reputation for being immune to malware, but a new report from Jamf reveals that it's tracked 300 malware families on macOS and found 21 new ones in 2023.

Jamf's latest Security 360 report examined a sample of 15 million desktop computers, tablets and smartphone devices they protect, across 90 countries and multiple platforms (macOS, iOS/iPad, Android and Windows).

Continue reading

How 5G is set to transform the way businesses connect [Q&A]

5G circuit board

The rollout of 5G will speed up mobile communications and also enable more computing tasks to be carried out at the edge.

For businesses it presents the opportunity for a greater understanding of customer patterns and infrastructure needs. We spoke to Chris Gehlen, CEO and co-founder of SaaS/NaaS cloud platform Neutroon, to learn more.

Continue reading

Greedy apps collect more information than they should

Nearly 87 percent of Android and 60 percent of iOS apps request access to device functions unrelated to their performance, according to new research by NordVPN.

Researchers analyzed the most popular mobile apps globally in 18 categories. They found that up to 14 percent of apps collect more unnecessary than necessary data for the apps' performance and only eight percent collect no unnecessary data. On average, every fifth requested permission was not actually needed for the app’s functionality.

Continue reading

How much does 1GB of mobile data cost around the world?

How much do you pay for a gigabyte of mobile data? Analysis of over 5,000 mobile data plans in 237 countries by comparison site Cable.co.uk compares the cost of 1GB of mobile data across the globe.

Israel is the cheapest with 1GB of data on the move costing a mere two cents. Italy is second-cheapest, with 1GB costing $0.085 on average. The US, however, ranks only 219th in the world, with an average 1GB cost of $6.00. The UK is 58th with 1GB costing on average $0.62.

Continue reading

Soon you will be able to use WhatsApp to chat with people on other platforms

Large WhatsApp logo surrounded by numerous small tech logos

WhatsApp not only remains astoundingly popular, developers continue to refine existing features and add new capabilities at an astonishing rate. The latest beta version of the messaging app shows exciting signs that it may soon be possible to use WhatsApp to send and receive messages between other platforms.

This is an important -- and much-requested -- development because while WhatsApp has a colossal userbase, it is not yet ubiquitous. The fact remains that not everyone you may want to chat with is necessarily a WhatsApp user. In the future, this should not be a problem with the arrival of support for third-party chats.

Continue reading

New mobile operating system focuses on security and privacy

Today's online world relies on monetizing information. Sensitive data is sourced through search engines, web browsers, and app developers and can be used to target marketing and more.

If you're concerned about how your data is used you might be interested in the launch by Myntex of Renati. This is a security-focused, Android-based mobile operating system for Pixel devices designed to disrupt data collection.

Continue reading

People are mad at Apple for a crazy change to the End Call button in iOS 17

iOS 17 End Call button

Change is often divisive, and with a UI tweak in iOS 17 Apple is certainly dividing opinion. In the latest beta version of the iPhone operating system, the company has made the decision to move the End Call button.

Shifting the button from the center of the screen -- where it has resided for many, many years -- is causing confusion and wails of discontent from beta testers. Having becomes use to the button being in a central position for well over a decade, users are complaining that the new location is a problem for muscle memory.

Continue reading

Enhancing workplace security: A comprehensive approach to Mac and mobile device compliance

business security

Workplace modernization has emerged as an important trend impacting organizations of all sizes, in all industries, and across all geographies. The move by so many businesses to embrace modern end-user technologies is anticipated to help improve recruitment, enhance employee productivity, and may have a measurable impact on talent retention.

One of the main forces behind workplace modernization is a belief that employees will be happier and ultimately more productive if they’re able to choose the devices they use for work. Coupled with both technical and organizational support for anywhere work styles, employees are finding they have a much stronger voice in the selection of IT tooling and the accompanying workflows.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.