Researcher Vladimir Katalov explained how documents and backups stored in Apple's iCloud can be accessed bypassing Apple's two-factor authentication, even when enabled, last week at the Hack in the Box conference in Malaysia.
Apple just closed up yet more lockscreen holes in iOS 7.
Reading the release notes will give you a sense of déjà vu - one of the bugs is pretty much the same hole that was patched in iOS 7.0.2...
One month after BlackBerry didn't release it's much-awaited BBM app for Android, imposter apps can still be found in the Google Play Store.
Should it be so easy to get obviously-bogus imitations past Google's vetting process?
Smartphones occupy a privileged position in our lives. Which do you trust enough to be your little, always-on, super computer companion? Take our poll and share your reasons.
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.
In the third part of Sophos Security Chet Chat 118, Chet interviews Vanja Svajcer to explain the rise of potentially unwanted applications on Android, what they are and how we might deal with them.
More coverage from the Virus Bulletin 2013 Conference in Berlin, Germany. Today's topics include Android botnets, malware abusing legitimate applications and defining the types of apps we allow on our phones.
Sophos has a larger than normal presense this week at the Virus Bulletin Conference in Berlin, Germany. Research presented includes bot nets, rootkits, Android and even techniques we can use to better protect others.
At this week's Virus Bulletin conference in Berlin, two SophosLabs researchers will present a paper on ads and adware in the mobile ecosystem.
We'd love to put *your* questions and comments to them from the conference floor - so here's your chance to have your say...
How do you copy fingerprints? Which is the most trustworthy browser? Who will use Facebook for payments? How long does an email address live?
Satisfy your curiosity with this week's 60 Second Security!
Apple has quickly fixed two lockscreen bugs that it introduced with iOS 7.
Well done, Cupertino!
(To all hardcore Apple fans reading this: that's not irony. I really mean it.)
We really didn't want to write another Apple iOS 7 story.
But with reports surfacing that HAL's smooth-talking stepsister Siri lets you *talk* your way into a locked iPhone, we couldn't help it.
The biometrics team of Germany's well-known Chaos Computer Club claims it has "cracked" Apple's Touch ID system.
From a fingerprint left on glass, the team claims to have used a technique documented by the CCC back in 2004 to produce a "fake finger."
Another iOS 7 lockscreen bypass has surfaced: this one lets you call anywhere in the world for free.
OK, not really "for free" - someone has to pay, and that's the owner, who probably assumed that the phone lock actually locks the phone part of the phone!
Serial iOS bug finder "videosdebarraquito" has struck again.
With some deft fingerwork, he can get into your photo gallery from the lockscreen and do pretty much what he wants with your images - such as publishing them online.
The UK is to trial a national emergency alerting system based on text messaging to your mobile phone.
Other countries have already done this, so it sounds uncontroversial - but can it be made to work safely and securely?
US citizens are now one step closer to being able to do (more or less) what they want with their gadgets, as the government petitions the FCC to once again legalize wireless device unlocking.