smartphones

US Border Patrol isn’t allowed to search travelers’ data stored in the cloud
When searching travelers’ mobile phones at the border, US Customs and Border Protection (CBP) officers do not have the authority to rifle through data stored solely on …

Attackers can steal smartphone users’ PINs by tapping into data collected by mobile sensors
Researchers have demonstrated that a malicious website or app could work out smartphone users’ PINs or passwords based just on the data collected by various motion …

Can smartphone thieves be identified in seconds?
Ben-Gurion University of the Negev (BGU) researchers have developed a technique that identifies a smartphone thief or intruder in under 14 seconds. “While most people …

Organizations to gradually replace physical access cards with smartphones
In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …

More Android-powered devices found with Trojans in their firmware
Doctor Web researchers have discovered two types of downloader Trojans that have been incorporated in the firmware of a number of Android-powered devices. Both Trojans are …

This year’s most hackable holiday gifts
Intel Security announced its second annual McAfee Most Hackable Holiday Gifts list to identify potential security risks associated with hot-ticket items this holiday season. …

Traveling on business? Beware of targeted spying on mobile
Corporate spying is a real threat in the world of cyber war. Employees traveling on behalf of their company could create opportunities for sophisticated adversaries to take …

When smartphone upgrades go wrong
As the holiday shopping season kicks into full gear around the world, industry analysts predict low prices, discounts and promotions will entice shoppers to buy the latest …

Unlocking Windows 10 PCs with smartphones, wearables, smart cards
With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the …

Iris scanning: A secure ID trend for smartphones?
The release of the Samsung Galaxy Note 7 sparked something positive – iris scanning. ABI Research forecasts global shipments of smartphones equipped with iris scanners …

New vulnerabilities affect over 900 million Android devices, enable complete control of devices
Check Point researchers have announced four new vulnerabilities that affect over 900 million Android smartphones and tablets at DEF CON in Las Vegas. QuadRooter is a set of …

Review: True Key for iOS
I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …
Featured news
Resources
Don't miss
- Deepfake attacks could cost you more than money
- Coinbase suffers data breach, gets extorted (but won’t pay)
- Samsung patches MagicINFO 9 Server vulnerability exploited by attackers
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”