Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Michigan State Police denies downloading drivers’ phone data

A few days ago, the American Civil Liberties Union of Michigan made public their belief that the Michigan State Police might have been using portable devices that allowed them …

Your iPhone keeps an unencrypted record of your movements

If you are an owner of an iPhone or a 3G iPad, you’ll probably want to know that your location – along with a timestamp – is recorded by the device and …

Encrypted text messaging for BlackBerry and Android

ProtectedSMS enables BlackBerry and Android users to exchange secure, encrypted text messages with individuals who have installed the software. Unlike other secure texting …

Michigan police downloading drivers’ phone data without warrants?

For a few years now, the Michigan State Police has been using portable devices that allow them to secretly extract personal information from cell phones of drivers who have …

Gaping security hole in Skype for Android

The Skype application for Android contains a flaw that allows a rogue app to access and harvest users’ personal information and things like chat logs from the device …

Office workers clueless about IT in general

Many office workers are not as tech or security aware as they could be, according to a new survey. When asked what cloud computing meant, a quarter thought it was a data …

Smartphone users feel more secure than PC users

Many users feel more secure using smartphones to surf the Internet than PCs, and a majority consider the risk of losing personal data higher on computers than on smartphones, …

The smartphone: A real bug in your bed

The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …

Malicious app found in Android Market

To infect a mobile device, the Rootcager/DroidDream Trojan used two known exploits: exploid and rageagainstthecage. If the first one failed to root the device, the malware …

Most users unaware of smartphone security risks

Consumers are indifferent to the many serious security risks associated with the storage and transmission of sensitive personal data on iPhone, Blackberry and Android devices, …

Security concerns around “backdoor” mobile devices

Employee owned, “backdoor’ mobile devices entering the corporate network highlight ongoing security challenges with enterprise mobility, according to Mformation. …

Illegal online pharmacies target mobile users

Malware authors have begun to set their sights on mobile device users, as witnessed by the latest Trojans made for Android-running devices, on official and unofficial online …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools