The tools criminals use to prepare a stolen iPhone for resale
Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their …
Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their …
A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a …
McAfee Labs saw healthcare surpass public sector to report the greatest number of security incidents in Q2, while the Faceliker Trojan helped drive quarter’s 67% increase in …
The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one …
Eight zero-day vulnerabilities affecting the Android, Windows, Linux and iOS implementations of Bluetooth can be exploited by attackers to extract information from, execute …
Google Dashboard, a privacy tool through which users can see what Google has learned about them through their use of the company’s products, has been redesigned. …
South Korean giant Samsung Electronics is now offering bounties for reported bugs in its mobile devices, software and services. “The rewards program kicked off with a …
40 percent of organizations believe that C-level executives, including the CEO, are most at risk of being hacked when working outside of the office, according to a new report …
There has been a lot of hype in the media about messaging tools. But recently, some of the headlines have taken a negative turn. Just last month, we read how a London-based …
Researchers have demonstrated that a malicious website or app could work out smartphone users’ PINs or passwords based just on the data collected by various motion …
Four US Congressmen have introduced on Tuesday a new law aimed at protecting Americans from warrantless searches of their digital devices when they cross the US border. The …
With a newly developed toolsuite that can analyze Android apps and detect whether two or more of them can collude with each other to acquire information that they would …