smartphones

When smartphone upgrades go wrong
As the holiday shopping season kicks into full gear around the world, industry analysts predict low prices, discounts and promotions will entice shoppers to buy the latest …

Unlocking Windows 10 PCs with smartphones, wearables, smart cards
With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the …

Iris scanning: A secure ID trend for smartphones?
The release of the Samsung Galaxy Note 7 sparked something positive – iris scanning. ABI Research forecasts global shipments of smartphones equipped with iris scanners …

New vulnerabilities affect over 900 million Android devices, enable complete control of devices
Check Point researchers have announced four new vulnerabilities that affect over 900 million Android smartphones and tablets at DEF CON in Las Vegas. QuadRooter is a set of …

Review: True Key for iOS
I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …

Secret Conversations: End-to-end encryption for Facebook Messenger
After integrating Open Whisper Systems’ Signal Protocol into WhatsApp earlier this year, Facebook has done the same to the Facebook Messenger app, and called the feature …

Will the next major data breach start on mobile?
Over the past few years, we have seen a spike in major data breaches from noteworthy businesses such as Target, Home Depot, and Sony (to just name a few). While data breaches …

The fragile security of the mobile ecosystem
Mobile devices such as smartphones and tablets have become indispensable in our daily lives. In fact, in Q4 2015, smartphones accounted for around 75 percent of all mobile …

Samsung Galaxy devices can be made to make calls, send messages while locked
Half a dozen (and possibly even more) Samsung Galaxy phones can be made to place phone calls or send text messages even when they are locked, thanks to exposed USB modems. …

WhatsApp implements end-to-end encryption by default
Over 1 billion users will get end-to-end encryption by default once they update to the latest version of the software. WhatsApp, the most popular messaging app in the world, …

The security impact of IoT evolution
Francis Bacon, First Viscount St. Alban (1561 – 1626), wrote, “As the births of living creatures, at first are ill-shapen, so are all innovations, which are the births of …

Encryption securing money transfers on mobile phones can be broken
A group of researchers has proved that it is possible to break the encryption used by many mobile payment apps by simply measuring and analysing the electromagnetic radiation …
Featured news
Resources
Don't miss
- LLMs can boost cybersecurity decisions, but not for everyone
- The unseen side of malware and how to find it
- SonicWall says attackers compromised some firewall configuration backup files
- Google fixes actively exploited Chrome zero-day vulnerability (CVE-2025-10585)
- LinkedIn now uses your data for AI by default, opt out now!