Blog Posts Tagged with "Smart Phone"
March 08, 2011 Added by:Danny Lieberman
The security requirements for mobile networked devices are similar to traditional wired devices but the vulnerabilities are different, namely the potential of unmanaged BYOD tablet/smartphone to be an attack vector back into the enterprise network and to be a channel for data leakage...
March 07, 2011 Added by:Robert Siciliano
"Step out your front door and you could be captured in a high-resolution photograph taken from the air or street by Google or Microsoft... Drive down a city thoroughfare, cross a toll bridge, or park at certain shopping malls and your license plate will be recorded and time-stamped...”
March 04, 2011 Added by:Headlines
Whenever you download or update an app, you are given a list of permissions for that app. That alarm clock app you are looking at probably shouldn't need to be looking through your contacts. The general rule of thumb is if an app is asking for more than it does, you should probably skip it...
March 03, 2011 Added by:Headlines
Logan Kugler writes about his experience with being "firesheeped" on a recent trip. Firesheep can harvest login credential on unencrypted Wi-Fi networks. He interviewed several information security experts to compile the following tips on locking down your mobile devices when traveling...
February 28, 2011 Added by:Robert Siciliano
The initial concerns involve rogue apps and phishing messages designed to extract credit card numbers and login credentials. As mCrime evolves and criminals begin to make some money, they will have the resources to hire crackerjack programmers to do their deeds...
February 25, 2011 Added by:PCI Guru
While iPhone is the “Big Kahuna”, it does not mean that Android and Windows Phone devices are not also used for credit card payments. Unfortunately, Android and Windows Phone devices have similar issues that make them difficult, if not impossible, to have PA-DSS certified applications...
February 17, 2011 Added by:Lee Mangold
Never before has the attacker had the ability to listen to phone calls, read emails, read SMS messages, geo-locate, watch and listen in on conversations of the victim all at the same time. This is what you call pwnd...
February 12, 2011 Added by:Dan Dieterle
iPhone passwords may not be as secure as one might believe. According to German security researchers from the Fraunhofer Institute Secure Information Technology (Fraunhofer SIT), if you have physical access to the phone, passwords can be recovered from a locked Apple iPhone in six minutes...
February 11, 2011 Added by:Headlines
Mobile attacks are proving easier for criminals to employ with greater success rates as opposed to PC based attacks, and with the dramatic increase in the volume of mobile transactions, cyber criminals are quickly adapting by shifting their focus...
February 08, 2011 Added by:Headlines
The growing popularity and variety of mobile communications platforms and a lack of consumer awareness about proper security precautions have provided criminals with ample opportunity to exploit devices like smartphones and tablets...
January 29, 2011 Added by:Theresa Payton
If you went to the airport, bank, or a store today, you probably expected to be watched. But those are the old school ways of being watched. Now, the smartphone in your pocket could watch you or your laptop webcam can watch you. Having an emotional reaction? There's a wristband monitor for that...
January 25, 2011 Added by:Headlines
Michael Gregg has assembled his picks for the top six hacks revealed at the Black Hat DC 2011 conference. Dozens of innovative threats were revealed at the conference last week, but Gregg describes these particular exploits as being the "six new hacks that will make your CSO cringe"...
January 24, 2011 Added by:Headlines
"Website owners should declare if they store your passwords using strong hashing. This is a simple process and not any more expensive to implement, however unfortunately websites not using this method of cryptography is something we see all too often..."
January 23, 2011 Added by:Headlines
"We implemented Soundminer on an Android phone and evaluated our technique using realistic phone conversation data. Our study shows that an individual's credit card number can be reliably identified and stealthily disclosed. Therefore, the threat of such an attack is real..."
January 21, 2011 Added by:Headlines
Researchers have designed code which makes it possible to pilfer data when a smartphone is connected by USB cable with a computer. The code adds a mouse or keyboard function to the USB driver that allows the attacker to take control of the units and download files or upload malware...
January 20, 2011 Added by:Headlines
Ralf-Philipp Weinmann of the University of Luxembourg has identified an over-the-air attack that targets the GSM/3GPP stack enabling hackers to execute malicious code that can turn a smartphone into a mobile listening device...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013