Please turn on your JavaScript for this page to function normally.
IoT cybersecurity law
UK enacts IoT cybersecurity law

The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect today, requiring manufacturers of consumer-grade IoT products sold in the UK to stop …

location services
The weaponizing of smartphone location data on the battlefield

For soldiers on the battlefield, the act of turning on one’s smartphone has been described as the digital equivalent of lighting a cigarette, as doing so creates a signal …

Bluetooth
BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

A Bluetooth Low Energy (BLE) vulnerability discovered by NCC Group researchers may be used by attackers to unlock Teslas (or other cars with automotive keyless entry), …

BYOD
60% of BYOD companies face serious security risks

When employees began bringing shiny, new smartphones into the office in the late 2000s, many business and IT leaders spotted an opportunity. They recognized the …

Eavesdropping scam: A new scam call tactic

Hiya has detected the newest scam call tactic, the eavesdropping scam. The new scam aims to get users to call back by leaving vague voicemail messages where an unknown voice …

identity theft
Cosumers don’t think they can dodge identity fraud

Nearly one in 10 smartphone users in the UK (9%), as many as 5.7 million people, have fallen victim to identity fraud in the last 12 months, according to a research by GBG. …

eavesdropping
How mobile app usage data could reveal a person’s identity

The time a person spends on different smartphone apps is enough to identify them from a larger group in more than one in three cases say researchers, who warn of the …

2022
Increased connectivity: What’s in store for 2022?

Deloitte released a report which highlights how trends in Technology, Media & Telecommunications (TMT) may affect businesses and consumers worldwide in 2022. The report …

EU
EU Commission takes on challenge to improve the cybersecurity of wireless devices

The European Commission has taken action to improve the cybersecurity of wireless devices available on the European market. As mobile phones, smart watches, fitness trackers …

vault
Image encryption technique could keep photos safe on popular cloud photo services

The past decade has witnessed scandal after scandal over private images maliciously or accidentally made public. A study from computer scientists at Columbia Engineering …

5G
5G business smartphone shipments to grow steadily

5G business smartphone shipments will grow at a CAGR of 28% over the 2021-2026 forecast period, according to a Strategy Analytics forecast. High positive growth is expected in …

Bitcoin
Bitcoin Security Rectifier app aims to make Bitcoin more secure

A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: …

Don't miss

Cybersecurity news