Please turn on your JavaScript for this page to function normally.
NIST mask research
Face recognition software making progress at recognizing masked faces

A study of face recognition technology created after the onset of the COVID-19 pandemic shows that some software developers have made demonstrable progress at recognizing …

phishing
Enterprise mobile phishing increased by 37% in Q1 2020

There was a 37 percent increase worldwide in enterprise mobile phishing encounter rate between the fourth quarter of 2019 and the first quarter of 2020, according to Lookout. …

5G
When do you plan to upgrade to 5G?

The smartphone will remain the dominant consumer device into the new decade, but the arrival of 5G will not guarantee a surge in device upgrades, according to a GSMA …

smartphone isolation
Researchers were able to detect what is typed using just a smartphone

You likely know to avoid suspicious emails to keep hackers from gleaning personal information from your computer. But a new study from SMU (Southern Methodist University) …

smartphone isolation
The future of smartphone security: Hardware isolation

Mobile spyware has become increasingly more ubiquitous in corporate networks and devices. In a 2017 study, Check Point has found that out of the 850 organizations that they …

Android Oreo
Android Oreo: What’s new on the security front

On Monday, Google released the long-awaited Android 8.0 Oreo in an unveiling that coincided with the total solar eclipse visible in much of the US. The newest version of the …

Samsung Galaxy S8
Samsung Galaxy S8 iris scanner can be fooled with a printed photo

After demonstrating how easily Apple’s Touch ID can be fooled with a user fingerprint photographed from a glass surface, Chaos Computer Club (CCC) hacker …

windtalker
Researchers reveal WiFi-based mobile password discovery attack

A group of researchers has come up with WindTalker, a new attack method for discovering users’ passwords and PINs as they enter them into their smartphones. WindTalker …

Xiaomi
Xiaomi smartphones come equipped with backdoor

When you buy a new mobile device with certain apps already pre-installed on, you’re effectively forced to trust that the device maker or reseller (depending on who …

The dangers of connecting phones to connected cars

As smart, connected cars get more ubiquitous, they are often the only option you get when renting a car from a rental agency. With all the reports about car hacking, you might …

match
Mobile device infections rose 96 percent in the first half of 2016

After examining general trends and statistics for malware infections in devices connected through mobile and fixed networks, Nokia found a sharp rise in the occurrence of …

introspection device snowden
Snowden wants you to know when your phone is revealing your location

NSA whistleblower Edward Snowden and hardware hacker Andrew “Bunnie” Huang have possibly come up with a solution for warning users when their phones are revealing their …

Don't miss

Cybersecurity news