Apenas una semana después de que Apple haya presentado oficialmente a los nuevos iPhone 6 y iPhone 6 Plus, ya circula en Facebook un nuevo scam que promete regalar dispositivos a quienes compartan el falso sitio y descarguen una aplicación. Por supuesto, el iPhone 6 gratis no llegará nunca porque se trata de un engaño.
Some users of Apple iPhones, iPads and Macs have been getting strange wake up calls and unsettling messages demanding a ransom for access to their devices. Now is the time to make your i-stuff is locked down, even if you don’t live in Australia.
Dos informáticos han encontrado la forma de desactivar el sistema que bloquea los dispositivos iPhone cuando son robados o extraviados, alojado en el servicio de almacenamiento en la nube iCloud, de Apple. Un iPhone puede ser bloqueado remotamente a través de iCloud, que tiene unos 400 millones de usuarios. Al vulnerar este sistema, se puede
Anthony Hariton, un estudiante de Computación de la Universidad de Creta (Grecia), dice que es posible generar tarjetas de embarque falsas pero válidas gracias a una falla en PassBook, la aplicación de Apple que permite almacenar en el iPhone cupones, entradas a eventos y hasta tarjetas de embarque a vuelos. PassBook brinda la posibilidad de
Mastercard is piloting a scheme where smartphone GPS systems are used to authenticate purchases for travellers – which could spell an end to the frustrating and common experience where cards are blocked instantly when used abroad.
Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.
On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet,
For years scammers and hackers focused largely on Windows x86-based platforms, in many ways because that’s where the bulk of the users were. But times change, and new targets emerge. At Blackhat and Defcon last week we saw a flurry of talks on Mac OSX/iOS security, trying to illuminate possible chinks in the armor. From
Just as I was putting the finishing touches on a blog post about the need to keep your data and devices safe on summer travels, I got an email from Apple letting me know that now was a great time to buy a Mac for college. I don't plan to go back to college at
News of SMS (text) phishing scams are nothing new to readers of this blog. ESET researcher Cameron Camp recently wrote an article explaining how they work and how to avoid them here on ESET’s Threat Blog: SMSmishing (SMS Text Phishing) – how to spot and avoid scams, And just before Valentine’s Day, my colleague Stephen
Do you use Google? These days the question sounds almost absurd. If you use the Internet, or an iPhone, or an Android phone, or a Kindle or an iPad, then of course you use Google in some shape or form. And if you take a keen interest in how your personal information is used, you
Introduction Mobile World Congress 2012 is almost upon us, and one of the most hotly-anticipated topics is the next generation of Microsoft’s smartphone operating system Windows Phone 8, which has been kept under wraps far more tightly than its PC counterpart, Windows 8. While Microsoft was an early adopter in the creation of smartphones with
The folks at Trusteer got their hands on the logs from some phishing sites and found that people using iPhones are more likely to fall for phishing attacks than users of other devices, including PCs. Some of the findings included: Mobile users get to the phishing site sooner than PC users. Mobile users are 3
Installing an application on an iPhone is a bit different than installing an application on an Android based system. With the iPhone you go to the App Store, select your application (and pay if required) then download and install it. For the Android based phones you go to the Android Market, select your application, download
Yesterday I blogged about a security company that found a high percentage of apps for the iPhone and for the Android were stealing user information. I call it stealing because the user is not aware of what personal data is leaving their phone. At the Blackhat Security Conference in Las Vegas the same company, Lookout
Do you have an iPhone or an Android based phone? Wait, don’t tell me, if you installed some third party apps I can probably find out. According to Lookout Inc., in an article at http://news.yahoo.com/s/ap/20100728/ap_on_re_us/us_tec_techbit_apps_privacy many of the iPhone and Android apps include spyware. To be fair, Lookout Inc didn’t call it spyware, but that
What would happen if every single one of the four BILLION cell phones on this planet just went dark? Or most likely, what would happen if every single cell phone went dark in one country? One scenario is a combined DoS attack on the internet was combined with a DoS attack on the cellular phone infrastructure at the same time.
Enterprise Mobile Today http://www.enterprisemobiletoday.com/news/article.php/3875521/Apple-Unveils-Key-iPhone-Upgrade.htm ran a story about some upgrades to the iPhone. There are a number of features in iPhone OS version 4. The operating system being able to multitask, like Android and other smartphones do. Corporate administrators will be able to push out updates instead of users being required to use iTunes to