In this feature we explore why mobile security is of the utmost importance for individuals and organizations. If smartphones and tablets not adequately protected, they are extremely vulnerable to being exploited.
Researchers from Nanjing University have found a way in which hackers could track a smartphone user on the subway – even when limited reception is available.
The voting system used by the Eurovision Song Contest was briefly forced offline after a suspected cyberattack caused an “extreme” surge in activity,.
A hacker has discovered that the openness of Tinder’s API allowed him to set up unknowing men via a fake female profile they both believed that they were talking to.
A vulnerability in Android’s Wi-Fi Direct functionality has been uncovered by security researchers.
Ever lost a kid somewhere? Not anymore if the gadget vendors have anything to say about it. Now you can digitally strap your kid to your tablet and keep track of them. Kids not running enough to stay trim? There’s an app for that that works the same way. Got high blood sugar? You can keep track of that too using the sensor-du-jour highlighted at CES 2015 in Las Vegas.
Hackers can eavesdrop on your phone calls and text messages even with cell networks using “the most advanced encryption available” according to The Washington Post.
It is now possible to enable HTTPS secure browsing on every website using Firefox for Android, the Electronic Frontier Foundation has announced.
BlackBerry has signed up to FIDO (Fast IDentity Online) Alliance – a group which is seeking to establish new methods to identify people quickly and safely, rather than relying on passwords for mobile security. FIDO is supported by internet giants such as Google and PayPal and is investigating alternative authentication technologies such as NFC chips, biometrics and one-time passwords, with a view to creating a standards-based system for passwordless authentication.
Android enthusiasts claim to have discovered a new vulnerability on Samsung smartphones that could allow an attacker to gain administrative access to the device through any installed app.
Many of us now buy goods and services online for the convenience and savings. The experts at ESET put together this guide to safer online shopping so you get the goods you want, and no nasty surprises. Tune your shopping machine Like the tune-up your car gets before a long drive, your laptop may need
We read that “FinFisher spyware made by U.K.-based Gamma Group can take control of a range of mobile devices, including Apple Inc.’s iPhone and Research in Motion Ltd.’s BlackBerry…”, at the opening of a Bloomberg article that several readers of the ESET blog sent us yesterday, along with a number of questions that boil down
Summer is here and for many families that means travels plans, but do your summer travel plans include taking care of your data and digital devices? Which digital devices do you plan to take on your trip and what sort of data do they contain? Perhaps more importantly: What kind of data can they access?
While our recent post on BYOD focuses on the prevalence and/or risk of inadequately trained staff potentially creating problems for the core IT infrastructure using their own personal devices for work, it seems others here at RSA are concerned with preventing the exact same thing, but from a different angle. I attended one “lighting round”
As legislators grapple with increasingly vocal smartphone owners concerned with privacy, a new Bill before the U.S. House of Representatives aims to require mandatory consumer consent prior to allowing the collection or transfer of data on such devices. You may recall that a company called CarrierIQ recently became the center of attention after a user
Wearing my vendor-independent Apple/smartphone commentary hat, I've just posted a couple of blogs on the Mac Virus site that some of you might find of interest. OK, suit yourselves. ;-) "Touching (or Bumping) Base" addresses a mixed bag of issues: Charlie Miller's presentation on fuzzing for "20 zero-day holes … in closed source Apple products"
According to Cell-news.com, in 2007 over 850,000 Brits flushed their cell phones down the toilet. I’m sorry to report that there isn’t much a security vendor can do to help you if you flush your cell phone. ESET recently commissioned a study of smart phone users concerning mobile security. The results are interesting. A little