Mobile Security

Mobile security news, trends, analysis and practical advice

thoughts on apple tim cook and privacy

Samsung flexes enterprise muscles with Tab Active and Knox

Samsung promoted enterprise uses for its upcoming Galaxy Tab Active rugged tablet, its Knox security and management software, and even its Gear VR headset at its recent Super Mobility Week event.

android malware

Many Android devices vulnerable to session hijacking through the default browser

The default browser in Android versions older than 4.4 has a vulnerability that allows malicious websites to bypass a critical security mechanism and take control of a user's authenticated sessions on other sites.

Not exactly Law & Order: IT Victims Unit

Flashback to 1994, when laptops cost $3,000 and are hard to come by at the company where this pilot fish works -- a situation that doesn't improve when the lone loaner laptop goes missing.

young man talking on a mobile phone

‘Can everyone hear me now?’

Voice interception of mobile calls is an invisible security hole that isn’t getting enough attention.

mobile security

Popular Android apps fail basic security tests, putting privacy at risk

Instagram, Grindr, OkCupid and many other Android apps fail to take basic precautions to protect their users' data, putting their privacy at risk, according to new study.

scarlett johansson naked selfie 2

Naked celebs: Hackers download sext selfies from iCloud

Scarlett Johansson, Jennifer Lawrence, Kate Upton... the sad list of naked celebs goes on. But what's Apple doing about it? ICYMI, hackers have downloaded celebrities' sexting pictures: It seems the victims' iCloud passwords were...

Surveillance tech

Are your calls being intercepted? 17 fake cell towers discovered in one month

CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. Most phones don’t show any signs that they are a target of stingray surveillance, such as when users’ calls are recorded, texts spoofed...

New attacks secretly use smartphone cameras, speakers and microphones

Do you regard your smartphone cameras and speakers as a security threat? You might after checking out presentations from the 8th USENIX Workshop on Offensive Technologies (WOOT). If you were a target, you would neither see, nor...

The biggest iPhone security risk could be connecting one to a computer

Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it's far from perfect.

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its...

Financial firms not offering two factor authentication

A recent article in the New York Times may, hopefully, shame financial firms into increasing their online security. The article, A Two-Step Plan to Stop Hackers by Ron Lieber is about two factor authentication (2FA), a system we...

Consumer Reports drops the ball on airport Wi-Fi

The September 2014 issue of Consumer Reports has one of their most disappointing articles. It's called "Free Wi-Fi takes off at airports" and is on page 10 (it's not available online). The article is a huge opportunity missed....

Black Hat talk exposes how easily criminals can hack mobile broadband modems

A Black Hat USA talk exposed how easily criminals can exploit vulnerabilities and built-in functionalities in mobile broadband modems. An attacker can remotely control a target’s Internet traffic, use the built-in SMS functionality to...

Carriers' remote control software still puts mobile devices at risk

Vulnerabilities found in remote management software that carriers insist be installed on smart phones and other mobile-enabled devices they sell are likely to put many devices at risk of compromise for some time to come.

Android vulnerability still a threat after nearly two years

Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery,...

Your Android has a Fake ID problem, allowing malware to impersonate trusted apps

Security researchers have identified a critical vulnerability in all versions of Android devices, from 2.1 to 4.4, that deals with how apps are signed. Bluebox Security dubbed the flaw Fake ID; in the same way an underage person...

BlackBerry buys Secusmart (in vain effort to stay relevant)

Gay-emm-beh WHO??? BlackBerry Ltd. (TSE:BB) is buying a German security company, Secusmart GmbH. We're told that this allows the Canadian company to offer super-secure voice and data -- as used by German government honcha,...

BlackBerry plans to focus on security for the enterprise

Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest...

Load More