Millones de dispositivos con Android son actualmente vulnerables a Heartbleed, la falla en OpenSSL que dejó al descubierto información sensible como contraseñas y credenciales bancarias de sitios alojados en los servidores afectados. A continuación veremos cómo esta vulnerabilidad afecta a los distintos proveedores móviles. ¿Qué sucede con Android? La semana pasada, Google anunció que Android
Contrary to reports late last week, the BlackBerry smartphones used by White House staffers and the President are not to be replaced by Android or Windows Phone handsets from Korean manufacturers LG and Samsung.
Following the ground up overhaul of the BlackBerry operating system and accompanying launch of their new flagship smartphones last year, we wondered how they really stack up–security wise–against the other smartphones you might already have in your pocket or purse right now. How do new devices running Blackberry 10–as the new OS is called–compare to
The Blackberry 10 operating system has been updated to include a ‘photo password’ mechanism, as well as stronger message filtering capabilities.
Embattled handset maker BlackBerry has faced another blow, after the company warned users of a security bug affecting the software used to link its BB10 handsets to PCs.
BlackBerry has signed up to FIDO (Fast IDentity Online) Alliance – a group which is seeking to establish new methods to identify people quickly and safely, rather than relying on passwords for mobile security. FIDO is supported by internet giants such as Google and PayPal and is investigating alternative authentication technologies such as NFC chips, biometrics and one-time passwords, with a view to creating a standards-based system for passwordless authentication.
The folks at Trusteer got their hands on the logs from some phishing sites and found that people using iPhones are more likely to fall for phishing attacks than users of other devices, including PCs. Some of the findings included: Mobile users get to the phishing site sooner than PC users. Mobile users are 3
…given the amount of detailed analysis that’s already available (and I mean substantial blocks of reverse-engineered code, not high-level analysis and code snippets and descriptions), I’m not sure that anyone with malicious intent and a smidgen of technical skill would need the original code…
According to Cell-news.com, in 2007 over 850,000 Brits flushed their cell phones down the toilet. I’m sorry to report that there isn’t much a security vendor can do to help you if you flush your cell phone. ESET recently commissioned a study of smart phone users concerning mobile security. The results are interesting. A little
Perhaps you read the Mozilla blog at http://blog.mozilla.com/addons/2010/02/04/please-read-security-issue-on-amo/ where it was revealed that two add-ons for Firefox were infected with Trojans. In this case the distribution was very small, so not many users were infected, but this type of attack is likely to grow. A large part of the time I worked at Microsoft I
SC Magazine recently reported a malicious application in Google’s Android online market store http://www.scmagazineus.com/malicious-apps-found-in-googles-android-online-store/article/161001/. Due to the highly open nature of Android applications, this is going to probably be a huge problem. Here is the real irony. Many people will probably switch from Android to the iPhone because of the security concerns. Why is it