Please turn on your JavaScript for this page to function normally.
mobile
Emergency Presidential Alerts can be spoofed, researchers warn

Spurred by the panic-inducing fake alarm about an inbound ballistic missile received by Hawaii residents in January 2018, a group of researchers from University of Colorado …

5G
5G subscriptions to reach 1.9 billion in 2024, critical IoT connections on the rise

Rapid early momentum and enthusiasm for 5G has led Ericsson to forecast an extra 400 million enhanced mobile broadband subscriptions globally by the end of 2024. The June 2019 …

iPhone
Two-thirds of iOS apps don’t use App Transport Security

Most iOS apps don’t take advantage of App Transport Security​ (ATS), a networking security feature offered by Apple that ensures encrypted connections between apps and …

Sign in with Apple
Apple debuts privacy-minded “Sign in with Apple” SSO

Among the many news shared during Apple’s annual developer conference there’s one that stands out: the introduction of “Sign in with Apple”. About the …

IoT
Number of connected devices reached 22 billion, where is the revenue?

The number of devices connected to the internet reached 22 billion worldwide at the end of 2018, according to the latest research from Strategy Analytics. Enterprise IoT …

USB
Employees are aware of USB drive security risks, but don’t follow best practices

Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by …

network
The perimeter is vanishing, how will you secure your network?

There’s a new reality to network security, driven by the fact that the perimeter is vanishing. The concept of a network being fully enclosed within a building or virtual …

smartphone isolation
Employee cybersecurity essentials part 2: Lost devices and unsafe connections

Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private …

Android smartphone
The surveillance economy has set its sights on smartphone sensors

The most successful companies of our time are those who’ve mastered user data – collecting it, analyzing it and profiting from it – typically at the expense of user privacy. …

Xiaomi
Vulnerability found in Guard Provider, Xiaomi’s pre-installed security app

Check Point Research discovered a vulnerability in one of the preinstalled apps on devices manufactured by one of the world’s biggest mobile vendors, Xiaomi. The vulnerability …

money
Cost of telecommunications fraud estimated at €29 billion a year

As our society evolves, so does our reliance on telecommunications technology. Cybercriminals prey on our daily use of electronic devices and continuously seek out new ways to …

Android Q
Android Q will come with improved privacy protections

Android Q, the newest iteration of Google’s popular mobile OS, is scheduled to be made available to end users at the end of August. While we still don’t know what …

Don't miss

Cybersecurity news