iPhone

Paranoid Android user? Maybe this “security pouch” will help

The waterproof metal-fabric pocket ensures users cannot be tracked or contacted – offering a level of privacy that DIY alternatives such as cocktail shakers cannot match.

The Dynamic Duo for Securing your Android: Common Sense and Security Software

On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet,

Confusion Abounds in Apple-FBI-AntiSec-iOS-UDID-PII Breach

If I sound confused it’s because I just saw my wife’s iPhone and iPad in a very strange place: a million line spreadsheet of iOS device data that includes the unique identifiers of her devices and the names she had given them, published by a group of hackers who call themselves AntiSec. This group claims

Mac OSX/iOS hacks at Blackhat – are scammers setting their sights?

For years scammers and hackers  focused largely on Windows x86-based platforms, in many ways because that’s where the bulk of the users were. But times change, and new targets emerge. At Blackhat and Defcon last week we saw a flurry of talks on Mac OSX/iOS security,  trying to illuminate possible chinks in the armor. From

SMSmishing Unabated: Best Buy targeted by fake gift card campaign

News of SMS (text) phishing scams are nothing new to readers of this blog.  ESET researcher Cameron Camp recently wrote an article explaining how they work and how to avoid them here on ESET’s Threat Blog: SMSmishing (SMS Text Phishing) – how to spot and avoid scams, And just before Valentine’s Day, my colleague Stephen

Google's data mining bonanza and your privacy: an infographic

Do you use Google? These days the question sounds almost absurd. If you use the Internet, or an iPhone, or an Android phone, or a Kindle or an iPad, then of course you use Google in some shape or form. And if you take a keen interest in how your personal information is used, you

Windows Phone 8: Security Heaven or Hell?

Introduction Mobile World Congress 2012 is almost upon us, and one of the most hotly-anticipated topics is the next generation of Microsoft’s smartphone operating system Windows Phone 8, which has been kept under wraps far more tightly than its PC counterpart, Windows 8. While Microsoft was an early adopter in the creation of smartphones with

Happiness is a Warm Smartphone*

…35% of iPhone/Android users in the US interact with their smartphones before they get out of bed…

Windows Mobile dialup fraud

It has been reported that a number of apps for smartphones running Windows Mobile that look like legitimate games also have autodialling functionality.

Bricking your cell phone: Mayhem on a Massive Scale

What would happen if every single one of the four BILLION cell phones on this planet just went dark? Or most likely, what would happen if every single cell phone went dark in one country? One scenario is a combined DoS attack on the internet was combined with a DoS attack on the cellular phone infrastructure at the same time.

Apple may or may not equal security

iPad and iPhone development and security issues are across the blogosphere and traditional media today. Starting with some interesting antivirus industry news concerning the iPad… Apple iPad users are being offered a security program to scan their new device for vulnerabilities and rogue software should such things emerge as threats. Hailing it as the first

iAds Come to the iPhone

Enterprise Mobile Today http://www.enterprisemobiletoday.com/news/article.php/3875521/Apple-Unveils-Key-iPhone-Upgrade.htm ran a story about some upgrades to the iPhone. There are a number of features in iPhone OS version 4. The operating system being able to multitask, like Android and other smartphones do. Corporate administrators will be able to push out updates instead of users being required to use iTunes to

Holes In The Cloud

About a month ago I gave a presentation in Kuala Lumpur that covered some of the concerns about the seemingly enthusiastic rush to push everything out "to the cloud". People in the Marketing business love the term "cloud computing" and have come up with some lovely images of fluffy clouds reflected on office blocks and

The iPhone Survey Final Results

The Survey is closed and I had a whopping 28 total responses :) The questions were 1. How often do you connect your iPhone to a computer with iTunes running? 2. Have you owned your iPhone for at least 6 months? 3. How did you learn of this survey? Five people did not respond to

iPhones, jailbreaking and blocked Apple IDs

[Update: The Register's John Leyden has also commented on the issue at http://www.theregister.co.uk/2010/02/16/apple_bans_iphone_hackers/] There's been a burst of interest in the last day or so in the blocking of certain Apple IDs from the iTunes App Store. Some bloggers have suggested that this might be a precursor to a massive blocking of jailbroken phones from accessing

iPhishing – gathering iPhone data

As posted a few minutes ago on Mac Virus, Dancho Danchev has posted information on a phishing campaign where the bad guys are impersonating Apple in order to steal sensitive device information from iPhone users. Dancho’s post, which has lots of other links, is at: http://blogs.zdnet.com/security/?p=5460&tag=col1;post-5460 David Harley CISSP FBCS CITP Director of Malware Intelligence ESET

The iPhone Survey

I recently blogged about Patching an iPhone. I’m not sure if I’ll get anymore takers for the survey at http://www.surveymonkey.com/s/V76LK5L, but if I do I’ll update the results. With 24 responses in, here is what I found. 15 (62.5%) users reported connecting their iPhones to a computer running iTunes at least once a week. Of

Patching an iPhone

Apple recently released a patch for the iPhone operating system. The fixes some pretty serious vulnerabilities, but… you must connect your iPhone to a computer and run iTunes to update the iPhone. This led me to start wondering how many iPhone users rarely connect their iPhones to a computer? I suspect there are quite a

Droid Avoids with an AppleJackHack

Will the Motorola Droid be the next malware-victimized smartphone? Well, it's a bit early to make a claim like that, but the fact that it's been rooted (an analogous process to jailbreaking on the iPhone and iPod Touch) in order to allow end-users to install unapproved applications, puts the platform one step nearer. See the

Whitelisting and the iPhone

The much reported/blogged iPhone worm does not affect all iPhones. Specifically it affects SOME iPhones that have been jailbroken. A significant part of the iPhone and iPod Touch security model is a technique called “whitelisting”. This is not new and is known to be a very effective security technology that can be used to prevent

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

1 article related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.