Latest News

Wireless and Mobile Security

Android Malware Repurposed to Thwart Two-factor Authentication Android Malware Repurposed to Thwart Two-factor Authentication

A malicious mobile application for Android that offers a range of espionage functions has now gone on sale in underground forums with a new trick: it’s being used by several banking trojans in an attempt to bypass the two-factor authentication method used by a range financial institutions.
17 April 2014

Despite Mobile, Cloud and Big Data, People Are the Biggest Security Weakness Despite Mobile, Cloud and Big Data, People Are the Biggest Security Weakness

As the volume of data generated within the enterprise workflow grows bigger each and every day, adopting a future-proof approach to information security will be increasingly imperative – and even more challenging. Much talk has arisen about the cloud and mobile devices, and their requisite applications, being a growing threat vector. But new survey results suggest that when it comes to protecting companies’ IT infrastructure, it is in fact people who present the biggest security problem.
17 April 2014

Android Flaw Allows Home Screen Icons to be Hijacked Android Flaw Allows Home Screen Icons to be Hijacked

A fresh Android vulnerability dubbed “occupy your icons” by mobile researchers has been uncovered. It allows a malicious app to replace legitimate Android home screen icons with fake ones that point to phishing apps or malware-serving websites.
14 April 2014

Secure File Sharing App for iOS and Android Released Secure File Sharing App for iOS and Android Released

Nebraska-based Linoma Software has released its GoAnywhere File Transfer app for the iOS and Android mobile operating systems
10 April 2014

Botnets Take to Mobile Dating App Tinder to Flirt and Hurt Botnets Take to Mobile Dating App Tinder to Flirt and Hurt

A series of bots have invaded the Android version of dating app Tinder, and are spreading dangerous downloads after luring users with tempting profiles and pictures stolen from an Arizona-based photography studio.
05 April 2014

Microsoft and secunet Team Up on Secure Tablet Microsoft and secunet Team Up on Secure Tablet

secunet and Microsoft Germany are showing how a reliable, highly secure and ultra-mobile solution can become reality through a combination of security technology made in Germany and a high-performance tablet.
04 April 2014

Tesla Electric Vehicle Owners Should Beware the Phish Tesla Electric Vehicle Owners Should Beware the Phish

Connected cars are continuing to wheel their way into consumer lives, with some, like Elon Musk’s Tesla line of electric vehicles, serving as prototypes for the Internet of Things (IoT)-enabled future. Sleek, sustainable and connected, the Tesla Model S is a futuristic automobile, with a robust set of communications capabilities. But because it connects with car owners and the Tesla infrastructure using a variety of TCP/IP mechanisms, one researcher is highlighting potential security issues.
01 April 2014

Angry Birds Leaks a Host of Info to Marketers Angry Birds Leaks a Host of Info to Marketers

Bad piggies may need to be toppled, but fans of the ubiquitous Angry Birds mobile app should be aware that the popular game collects and shares players’ personal information much more widely than most people realize.
28 March 2014

Snoopy: A Non-NSA Flying Stingray Snoopy: A Non-NSA Flying Stingray

Stingray is a US law enforcement spoof cell tower used to track the location of mobile phones. Snoopy is a project conducted by London-based Sensepost Research Labs that does similar and much more with any WIFI-enabled device. Now Snoopy has gone airborne – mounted on a drone it can hover above a target area and trick mobile devices into connecting: a form of flying MITM attack.
26 March 2014

Google Encrypts Connections Between its Servers Google Encrypts Connections Between its Servers

Google has made the use of HTTPS encryption mandatory for all Gmail. It has also, in response to revelations that security agencies tap the fibers between its data centers, now started to encrypt all email as it flows from server to server en route to its destination. The result will prevent any mass surveillance of Google emails.
25 March 2014

Showing 1 - 10 of 1,662 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×