MMO Attack Mobile brings you the best MMO and MMORPG content from our site to your iOS devices. Read gaming news, articles, reviews,...
Showing results 1 to 20 of 36
Lenovo's spent more than $5 billion in the past week to become relevant in the low-end server and mobile handset markets. While its surging tablet business is still just a drop in the bucket, this multipronged attack could reap huge benefits in emerging markets.
Remember Spamhaus? The attack was apparently conducted not from a bedroom, but an antenna-equipped mobile van.
Karachi residents will not have mobile services for a 12-hour window, as the police tries to prevent a planned terrorist attack on the city.
There's more than one way to chip away at Google's search share, according to Microsoft. Mobile apps offer another avenue, says head of Redmond's AppEx team.
What happens to users and their phones in the event of a mobile malware epidemic or a terrorist attack? Researchers at a California-based lab are hoping to answer those very questions using simulations.
All three mobile carriers have signed on to provide emergency alerts over their mobile networks when customers are in an area experiencing an emergency, such as a bushfire or terrorist attack.
As you move data around your mobile device it's important to understand that these can be hacked -- even in a mass-attack using a compromised ad-network -- and try to keep the damage to a minimum.
Conference organizers at the EuSecWest are dangling cash prizes for any hacker who can demo a successful zero-day attack on mobile web browsers, Near Field Communication (NFC), Short Message Service (SMS) and the cellular baseband.
Up to 13 million UK customers of Barclays Bank are vulnerable to losing payment card details through a mobile phone attack, ZDNet UK has learned.In a report due to be transmitted on Channel 4 News on Friday, the broadcaster is to say that contactless readers in mobile phones can be reprogrammed to extract card data from Barclays cards when they come near each other, even through clothing, wallets or bags.
Google claims that Android rivals are using 'bogus patents' to attack the mobile OS, but Microsoft offers up evidence to suggest that Google dealt itself out of patent discussions.
Ninety percent of businesses have been hit by a cybersecurity breach in the past year. Breaches cost 41 percent of businesses $500,000 or more. And the top two endpoints under attack are laptops and mobile devices.
At its annual investor meeting, Intel announced a significant change to its product roadmap designed to boost its efforts to get its chips into ultra-mobile devices of all shapes and sizes.
Getting malware onto smartphones has until now involved a PC somewhere along the way, but that's about to change. Next-generation mobile malware is only months away, which will attack the device directly, leading to developments such as mobile botnets, according to Amil Klein, chief technology officer at Trusteer.
Which? and Consumer Focus have accused T-Mobile of forgetting that many of its smartphone users only joined the operator because of the high data-use limit that it will shortly reduce by up to 83 percent
Malicious Mobile Apps a Growing ConcernAuthor: Eric Everson, MBA, MSIT-SEThe phrase “mobile security” does not usually mean much to anyone, until of course they encounter their first mobile attack. For a growing number of App Store and Android Market customers, this is a growing fear that is becoming all too real.
Open source evangelist Jeremy Allison was in New Zealand yesterday, where he issued dire warnings of Microsoft launching a patent attack against open source to win back mobile market share.
2009 Mobile Security Outlook: The Year of Mass Attack Mobile VirusesAuthor: Eric Everson, Founder MyMobiSafe.comIt’s that time of year when everyone is on the lookout for the trends that may surface in the year ahead.
T-Mobile has a unique opportunity to launch an immediate counter-attack against Apple in the mobile applications game. Apple's got a strong headstart, with more than 100 million downloads in its first 60 days.
While one government agency has warned that mobile devices could be used to cripple critical infrastructure, another has downplayed the likelihood of a successful attack
Notable headlines:Larry Dignan: Apple blows through estimates; Ships 2.29 million Macs; Outlook light by design?
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)