Category: Mobile

Twitter Turns on Support for Two-Factor Authentication Apps

Beyond offering its own added layer of security in enabling SMS-based two-factor authentication (2FA) for its users, Twitter is now granting support for useful third-party authentication apps such as...

Read more arrow_forward

911 Emergency System at Risk from Infected Android Phones

New research has shown that thousands of malware-infected Android phones could launch an automated DDoS attack on the United States emergency phone system with the potential to cripple it “for...

Read more arrow_forward

Alen Gojak on Mobile forensics investigations

Alen Gojak, a mobile device examiner and mobile forensic expert based in Croatia, spoke about the current trend in mobile forensic investigations at an interview conducted by LIFARS. Alen is a former...

Read more arrow_forward

Mobile Security - In the Words of Experts

With all the buzz around mobile security lately, we have decided to compile a list of some of the best mobile security quotes from experts on mobile security – shedding light on the topic...

Read more arrow_forward

Why is Facebook this Slow to Patch Security Holes?

Serious security hole not patched almost a year after it was reported to the social media giant. Why?

Read more arrow_forward

iOS Masque Attack: A Worrisome Attack Targeting iOS 7+ Devices

Are you an iPhone or an iPad user? A worrisome vulnerability within iOS allows attackers to install impostor apps on your device and steal sensitive information.

Read more arrow_forward

WireLurker: A Revolutionary Malware Targeting Apple iOS Devices

Do you own an Apple device? If so, you need to read this to minimize the risks of getting infected by this revolutionary malware that infected hundreds of thousands of users already.

Read more arrow_forward

AirHopper: Remotely Stealing Information from Offline Computers Using FM Waves

The future is here! Smartphones can now steal information off the screen of highly secure offline systems using nothing more than FM radio waves.

Read more arrow_forward

Chinese Smartphone Maker Xiaomi Under Attack (Again)

Xiaomi, the Chinese largest smartphone maker, is under attack, again.

Read more arrow_forward

BadUSB - Attack Explained (Video)

For those of you that might have missed one of the hottest topics of this month, the BadUSB attack method, we created a short and simple to understand video that explains the basics of the...

Read more arrow_forward

Some Smartphones Come Preinstalled with Chinese Spyware

You new, expensive smartphone might be spying on you out of the box.

Read more arrow_forward

A Flaw Within Samsung's 'Find My Phone' Service Allows Hackers to Remotely Lock Your Device

Samsung users beware, a zero-day flaw was discovered within the Samsung Find My Phone online phone tracking service. The flaw was announced by the National Institute of Standards and...

Read more arrow_forward

Top 10 Smartphone Flashlight Apps Are Spying on You!

Why does an app that should only be using your LED light need permissions to know your GPS location, access your photos and videos, your camera, microphone, full network access, and so on?

Read more arrow_forward

Google Allows 2-Step Authentication via a Physical USB Key

Starting today, Google started offering an extra layer of security for its users when logging into their accounts. It comes in the form of a physical USB key which can be purchased for under $20. The...

Read more arrow_forward

Better Smartphone Security Through Biometrics

Biometric technology is slowly entering our lives via our smartphones. Does is add enough security?

Read more arrow_forward

AT&T Facing Trouble on Two Fronts

AT&T employee steals 1,600 customers' data while the company settles a 105 mil. lawsuit.

Read more arrow_forward

Apple's New Encryption Won't Stop Intelligence Gathering

If you think Apple's new encryption will be a game-changer, you might be let down.

Read more arrow_forward

BadUSB: Time to Start Checking Your Laptop's USB Ports Before Turning On

A security researcher duo released the tools and tutorial on how to turn your USB drive into a cyberweapon.

Read more arrow_forward

Spying via Smartphones: A Simple Guide to Staying Safe

Smartphone "spies" might be watching you right now. How can you stay safe?

Read more arrow_forward

If you have any further questions, please don't hesitate to contact us.