Mobile

Too many, different operating systems running on Internet of Things devices could be a huge security headache, Fortinet warns.

The IoT has a Diversity Problem: Too Much of It

In-brief: The Internet of Things has a diversity problem. Namely: there is too much of it. At least in the arena of operating systems.

Telecommunications firms including AT&T, Verizon and KPN in Netherlands (pictured) are working to build out infrastructure to support connected devices.

Report: AT&T and Gemalto Team on IoT Lifecycle Management

In-brief: AT&T is partnering with Gemalto to offer lifecycle management features for Internet of Things devices, as the telecommunications giant targets automotive telematics, infotainment, and smart safety services.

Mobile software is raising alarms again after researchers at the firm Anubis Networks warned about a hidden program in software running on millions of low cost Android smart phones that appears to be a "rootkit."

Another Week, Another Dangerous Mobile Firmware Vulnerability

In-brief: The security firm Anubis Networks said in a blog post that it has discovered a mystery code by the firm Ragentek that is used in a number of low-cost Android smart phones, used across 55 different device models.

The BLU R1 HD phone was observed sending sensitive user data back to a server in China. The company responsible, Shanghai Adups Technology Co. Ltd., said that was a mistake and that the problem has been corrected.

Software Used in Mobile Phones Sends Texts, Location Data and Contacts Back To China

In-brief: software used in at least one brand of smart phones sold in the U.S. was found to secretly send private information about the phone’s owner back to servers in China, according to a report by the security firm Kryptowire.

Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog

Beware: Targeted Attacks on iPhone Users are a Thing | Lookout Blog

In-brief: Lookout said it identified an active threat that was using three critical iOS zero-day (that is: previously unknown) vulnerabilities. When exploited, the three vulnerabilities “form an attack chain that subverts even Apple’s strong security environment.”