Blog Posts Tagged with "Smart Phone"

69dafe8b58066478aea48f3d0f384820

Android Privacy Flaw Exposes 99.7% of Users

May 19, 2011 Added by:Headlines

"Today we're starting to roll out a fix which addresses a potential security flaw that could, under certain circumstances, allow a third party access to data available in calendar and contacts. This fix requires no action from users and will roll out globally over the next few days..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Android Malware Increased 400% Over Six Months

May 11, 2011 Added by:Headlines

"App store processes of reactively removing applications identified as malicious after they have been installed by thousands of users is insufficient as a means to control malware proliferation. There are specifics steps users must take to mitigate mobile attacks..."

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Smart Phone Privacy and Anonymizing the Nokia N900

May 08, 2011 Added by:Kyle Young

A lot of people are now using and relying on smart phones. Part of what makes these devices so ’smart’, is their ability to gather information on the user and use this information.The problem with this is that a lot of private information is being gathered...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Google Sued for Surreptitious Android Location Tracking

May 03, 2011 Added by:Headlines

The lawsuit alleges privacy violations for the collection of location data, deceptive business practices for failing to notify customers, and violations of the Computer Fraud and Abuse Act for harvesting the data from individual devices...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Should You Worry About Smartphone Security?

May 02, 2011 Added by:Robert Siciliano

“Mobile systems lag far behind the established industry standard for open disclosure about problems and regular patch distribution. For example, Google has never made an announcement to its android-security-announce mailing list, although of course they have released many patches.."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Banking Becoming an E-Commerce Staple

April 29, 2011 Added by:Robert Siciliano

Enhanced security with SMS transaction notifications and the ability to turn card accounts on or off, and new technologies like mobile check deposit, in which you simply take a cell phone picture of the check, are contributing to the increasing popularity of mobile banking...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple Lied: Filed Patent for Mobile Device Tracking

April 29, 2011 Added by:Headlines

Revelations of the patent application now confirm suspicions that Apple was quite aware of the storage of geolocation tracking data, that it was not merely a database of Wi-Fi locations, and the building of location histories on their customers was not due to a software glitch...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Microsoft Statement: We Collect Your Location Data Too

April 27, 2011 Added by:Headlines

Microsoft insists that if the Wi-Fi feature is disabled on a device that no location data is collected or transmitted, and also states that even if the feature is active, data is only collected if the user gives an application permission to access location data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Apple Posts Statement on iOS Location Data Collection

April 27, 2011 Added by:Headlines

Apple confirms collecting location the data, but states that the information only reflects a database of Wi-Fi hotspots and transmission towers that a phone has come into signal range of - which is akin to saying your car is not tracked, just the streets it has been driven on...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

How Much Does Your Smartphone Know About You?

April 26, 2011 Added by:Headlines

"I plugged my phone into my computer and opened an application called Lantern... Ten minutes later, I'm staring at everything my iPhone knows about me. About 14,000 text messages, 1,450 Facebook contacts, tens of thousands of locations pings, every website I've ever visited..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Public Wi-Fi Leaves Smartphone Data Vulnerable

April 26, 2011 Added by:Headlines

"This is all very alarming. It means that literally millions of people who use Wi-Fi in public could be at risk. If criminals are able to harvest the usernames and passwords of all the websites you visit, they could do significant damage in terms of identity theft and fraud..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Top Five Mobile Operating System Options

April 20, 2011 Added by:Robert Siciliano

Five major players have floated to the top, dominating a major chunk of the mobile operating systems market. It used to be that people chose their phone only by their carrier and what brands they offered. Today many choose their phone based on the manufacturer and its operating system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

A Brief History of Smartphone Insecurity

April 20, 2011 Added by:Headlines

Statistics show that the targeting of mobile devices by criminal hackers continues to grow more intense. Brad Reed has an excellent article that traces the brief history of smartphone insecurity, listing the top smartphone vulnerability exploits of the last five years...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Rise of Smartphones and Related Security Issues

April 18, 2011 Added by:Robert Siciliano

As more and higher speed networks are built, more consumers will gravitate toward the mobile web. Smartphone users are downloading billions of apps and spending millions via mobile payments. For the younger generation, smartphones are used for a majority of ecommerce transactions...

Comments  (0)

F520f65cba281c31e29c857faa651872

Mobile Devices Continue to Attract Cyber-Scamsters

April 17, 2011 Added by:Rahul Neel Mani

While it’s only beginning to percolate, a trend is clearly emerging— cyber criminals are looking for new opportunities outside of the PC environment. They are investing more resources toward developing exploits that specifically target users of mobile devices...

Comments  (0)

485f5553442ebdfbfa4926166697c319

Enforcing Authentication on Employee Smartphones

March 14, 2011 Added by:Roman Yudkin

As employees continue to use their smartphones for both personal and business purposes, businesses must begin implementing stringent security measures and educating their employees on the importance of protecting the mobile devices and specific applications with layers of authentication...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »