Latest News

Wireless and Mobile Security

Retail Tracking and Privacy Crypto Cracked in Minutes, for Less than a Dollar Retail Tracking and Privacy Crypto Cracked in Minutes, for Less than a Dollar

Retail analytics have been around for a dog’s age, allowing stores – whether virtual or real – to track customer behavior and offer up related offerings accordingly. It’s a central part of the up-sell and cross-sell process that keeps the sector humming along with repeat business.
20 March 2014

NSA Collects the Whole Voice Conversation of an Entire Nation NSA Collects the Whole Voice Conversation of an Entire Nation

It could, in fact, be at least five nations, with a sixth scheduled for inclusion soon. These revelations were published yesterday in a report based on Snowden leaks just after Edward Snowden himself warned the TED2014 Conference audience in Vancouver that there are more – and worse – revelations to come.
19 March 2014

WhatsApp Says It Will Maintain Users' Privacy Despite Facebook's Takeover WhatsApp Says It Will Maintain Users' Privacy Despite Facebook's Takeover

WhatsApp has always been high profile because of its success (450 million users and, at least before the takeover, growing fast). But since it was bought by Facebook for $19 billion, it has been placed under a direct spotlight. Concerns are that its historic value on user privacy will be usurped by Facebook's business model of selling what it knows to advertisers.
19 March 2014

Commercial RAT Used by Malicious Hackers Commercial RAT Used by Malicious Hackers

Win-Spy is a commercial off-the-shelf (COTS) stealth monitoring tool. "Start Spying on any PC or Phone within the Next 5 minutes," says its website. With such products generally available, why should hackers go to the trouble of developing their own RATs? Indeed, according to a FireEye analysis following an attempted intrusion on a US financial institution, they don't.
18 March 2014

Security in Apple's iOS 7 Weaker, Not Stronger, than iOS 6 Security in Apple's iOS 7 Weaker, Not Stronger, than iOS 6

Aware of weaknesses in the early_random() pseudo random number generator used in iOS 6, Apple switched to an entirely new generator in iOS 7. In doing so, however, it weakened rather than strengthened the random number generation that lies at the heart of many of the attack mitigations that supposedly make iOS a secure operating system.
17 March 2014

Backdoor Found in Samsung Galaxy Backdoor Found in Samsung Galaxy

A developer working on Replicant, an open-source free mobile operating system designed to replace all proprietary Android components with open-source alternatives, has discovered a backdoor in Samsung Galaxy that provides almost full access to user files, camera, microphone and location.
14 March 2014

WhatsApp Flaw Not As Overstated as WhatsApp Claims WhatsApp Flaw Not As Overstated as WhatsApp Claims

After a Dutch IT consultant published a proof-of-concept showing how a WhatsApp user's chat history could be stolen, WhatsApp responded by saying the reports were 'overstated' and that the messaging service had been updated "to further protect our users against malicious apps." The proof of concept code, however, still works.
14 March 2014

Nokia Tackles Carrier Roles in Mobile Security with Berlin-based Cybersecurity Center Nokia Tackles Carrier Roles in Mobile Security with Berlin-based Cybersecurity Center

With the infiltration of handheld devices into virtually every aspect of our consumer and enterprise lives, mobile networks should be considered critical infrastructure with high impact on public welfare and safety; and cyber-security should be addressed accordingly. That’s the premise behind Nokia Solutions and Networks’ plans to establish a Mobile Broadband Security Center in Berlin.
13 March 2014

Enterprises Set to Increase Security Budgets Enterprises Set to Increase Security Budgets

As the threat landscape gets more and more complex when it comes to cybersecurity, a beacon has appeared in the shifting seas: it looks like enterprises will have a strong budget for security projects in 2014. Compliance, mobility and access management are all spurring project spending.
12 March 2014

Apple Fixes a Bevy of Serious Flaws with Latest iOS 7.1 Update Apple Fixes a Bevy of Serious Flaws with Latest iOS 7.1 Update

Apple has released its second iOS 7.1 security update in less than three weeks, this time fixing a host of code execution and other vulnerabilities that could compromise iPhone, iPad and iPod Touch owners.
11 March 2014

Showing 21 - 30 of 1,671 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×