tag
iPhone

Nexus 5, Galaxy S5 and iPhone 5s hacked at Pwn2Own event

The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the Mobile Pwn2Own hacking competition, reports Forbes.

Apple Pay and security – what you need to know

Mobile payments look set to be one of the defining technologies of 2015, as the launch of Apple Pay catalyses a boom in cardless payments – both from Apple’s own system, and rivals playing catch-up.

¿iPhone 6 gratis? Ten cuidado con los últimos scams

Apenas una semana después de que Apple haya presentado oficialmente a los nuevos iPhone 6 y iPhone 6 Plus, ya circula en Facebook un nuevo scam que promete regalar dispositivos a quienes compartan el falso sitio y descarguen una aplicación. Por supuesto, el iPhone 6 gratis no llegará nunca porque se trata de un engaño.

iPhone and Apple ransom incidents? Don’t delay locking down your i-stuff

Some users of Apple iPhones, iPads and Macs have been getting strange wake up calls and unsettling messages demanding a ransom for access to their devices. Now is the time to make your i-stuff is locked down, even if you don’t live in Australia.

Tarjetas de embarque falsificadas podrían permitirte volar gratis

Anthony Hariton, un estudiante de Computación de la Universidad de Creta (Grecia), dice que es posible generar tarjetas de embarque falsas pero válidas gracias a una falla en PassBook, la aplicación de Apple que permite almacenar en el iPhone cupones, entradas a eventos y hasta tarjetas de embarque a vuelos. PassBook brinda la posibilidad de

Mastercard trials fraud-busting GPS app to end misery of blocked payments on vacation

Mastercard is piloting a scheme where smartphone GPS systems are used to authenticate purchases for travellers – which could spell an end to the frustrating and common experience where cards are blocked instantly when used abroad.

¿No actualizaste tu iPhone o iPad el fin de semana? Es hora de hacerlo

El fin de semana se hizo púlica una vulnerabilidad de alta criticidad para sistemas iOS, es decir, para todos aquellos que cuenten con dispositivos de Apple como iPhone o iPad, e incluso posteriormente se anunció que los equipos con Mac OS también están en riesgo. La vulnerabilidad afecta la seguridad en el uso del procotolo

Urgent iPhone and iPad security update, Mac OS X as well

Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.

The Dynamic Duo for Securing your Android: Common Sense and Security Software

On Thursday, September 12, Duo Security, a young-but-respected vendor of two-factor authentication devices, announced the preliminary results of a study of over 20,000 Android devices from a two month old study they performed. Based on the results, they calculated that over half of Android devices on the market have security vulnerabilities that are, as yet,

Mac OSX/iOS hacks at Blackhat – are scammers setting their sights?

For years scammers and hackers  focused largely on Windows x86-based platforms, in many ways because that’s where the bulk of the users were. But times change, and new targets emerge. At Blackhat and Defcon last week we saw a flurry of talks on Mac OSX/iOS security,  trying to illuminate possible chinks in the armor. From

Back to school scams? They may be just around the corner

Just as I was putting the finishing touches on a blog post about the need to keep your data and devices safe on summer travels, I got an email from Apple letting me know that now was a great time to buy a Mac for college. I don't plan to go back to college at

SMSmishing Unabated: Best Buy targeted by fake gift card campaign

News of SMS (text) phishing scams are nothing new to readers of this blog.  ESET researcher Cameron Camp recently wrote an article explaining how they work and how to avoid them here on ESET’s Threat Blog: SMSmishing (SMS Text Phishing) – how to spot and avoid scams, And just before Valentine’s Day, my colleague Stephen

Google's data mining bonanza and your privacy: an infographic

Do you use Google? These days the question sounds almost absurd. If you use the Internet, or an iPhone, or an Android phone, or a Kindle or an iPad, then of course you use Google in some shape or form. And if you take a keen interest in how your personal information is used, you

Windows Phone 8: Security Heaven or Hell?

Introduction Mobile World Congress 2012 is almost upon us, and one of the most hotly-anticipated topics is the next generation of Microsoft’s smartphone operating system Windows Phone 8, which has been kept under wraps far more tightly than its PC counterpart, Windows 8. While Microsoft was an early adopter in the creation of smartphones with

Happiness is a Warm Smartphone*

…35% of iPhone/Android users in the US interact with their smartphones before they get out of bed…

Is it the iPhone or the User?

The folks at Trusteer got their hands on the logs from some phishing sites and found that people using iPhones are more likely to fall for phishing attacks than users of other devices, including PCs. Some of the findings included: Mobile users get to the phishing site sooner than PC users. Mobile users are 3

Android Application Security

Installing an application on an iPhone is a bit different than installing an application on an Android based system. With the iPhone you go to the App Store, select your application (and pay if required) then download and install it. For the Android based phones you go to the Android Market, select your application, download

Google Android and Really Bad Math

Yesterday I blogged about a security company that found a high percentage of apps for the iPhone and for the Android were stealing user information. I call it stealing because the user is not aware of what personal data is leaving their phone. At the Blackhat Security Conference in Las Vegas the same company, Lookout

Dead Men Tell No Tales, but Smart Phones Tell All

Do you have an iPhone or an Android based phone? Wait, don’t tell me, if you installed some third party apps I can probably find out. According to Lookout Inc., in an article at http://news.yahoo.com/s/ap/20100728/ap_on_re_us/us_tec_techbit_apps_privacy many of the iPhone and Android apps include spyware. To be fair, Lookout Inc didn’t call it spyware, but that

iPhone Through the Looking Glass

…iPhones are, under limited circumstances, willing to share information with other devices when they shouldn’t…

Follow Us

Sign up to our newsletter

The latest security news direct to your inbox

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.