smartphones
NSA collects 200 million text messages a day
As the world awaits US President Obama’s official announcement of his plans for an NSA reform, The Guardian disclosed details of yet another NSA bulk data collection …
WhatsApp-themed spam campaign delivers malware
A new WhatsApp-themed spam campaign has been spotted targeting users of the popular IM service. The spam email claims to be a notification about a voice message someone left …
What do people want to hide on their smartphone?
More than half of Americans (52%) would be embarrassed about friends or family seeing certain files or documents on their smartphone, according to Clean Master. The number one …
GCHQ hacks GRX providers to mount MitM attacks on smartphone users
A new report by German Der Spiegel has revealed that the Government Communications Headquarters (GCHQ), the UK equivalent of the US NSA, has compromised a number of Global …
Can you trust the apps you use?
With the advent of smartphones, the word “app” has almost become a synonym for pleasure. Whatever you need, whatever you want is right there at your fingertips, …
CyanogenMod announces secure phone locating, remote wiping service
The CyanogenMod team has announced a new service that allows users to locate their lost phones or securely wipe their device (including the contents of the SD card) in case it …
Researchers create DIY IDS for identifying hacked smartphones
A group of researchers from LMG Security has leveraged a Verizon Samsung femtocell – a small cellular station for extending cell phone coverage range indoors or at the …
Researchers hack femtocells, record mobile phones’ calls, SMS traffic
Intercepting voice calls, SMS messages, and web traffic coming and going from a target’s mobile phone may be as simple as waiting for his phone to associate to a …
The future of electronic payment: Smartphone authentication and facial recognition
Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented …
In-house control and encrypted voice calls
Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …
Cutwail botnet now spreads Android malware
Successful malware peddlers are always thinking up new ways of delivering malware to unsuspecting users. In the past Android malware was mostly served on third-party online …
Security professionals don’t have secure mobile habits
Security professionals have embraced BYOD and they’re taking “anytime, anywhere” access to some pretty interesting locations according a new survey by Ping …
Featured news
Resources
Don't miss
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?