smartphones

New vulnerabilities affect over 900 million Android devices, enable complete control of devices
Check Point researchers have announced four new vulnerabilities that affect over 900 million Android smartphones and tablets at DEF CON in Las Vegas. QuadRooter is a set of …

Review: True Key for iOS
I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …

Secret Conversations: End-to-end encryption for Facebook Messenger
After integrating Open Whisper Systems’ Signal Protocol into WhatsApp earlier this year, Facebook has done the same to the Facebook Messenger app, and called the feature …

Will the next major data breach start on mobile?
Over the past few years, we have seen a spike in major data breaches from noteworthy businesses such as Target, Home Depot, and Sony (to just name a few). While data breaches …

The fragile security of the mobile ecosystem
Mobile devices such as smartphones and tablets have become indispensable in our daily lives. In fact, in Q4 2015, smartphones accounted for around 75 percent of all mobile …

Samsung Galaxy devices can be made to make calls, send messages while locked
Half a dozen (and possibly even more) Samsung Galaxy phones can be made to place phone calls or send text messages even when they are locked, thanks to exposed USB modems. …

WhatsApp implements end-to-end encryption by default
Over 1 billion users will get end-to-end encryption by default once they update to the latest version of the software. WhatsApp, the most popular messaging app in the world, …

The security impact of IoT evolution
Francis Bacon, First Viscount St. Alban (1561 – 1626), wrote, “As the births of living creatures, at first are ill-shapen, so are all innovations, which are the births of …

Encryption securing money transfers on mobile phones can be broken
A group of researchers has proved that it is possible to break the encryption used by many mobile payment apps by simply measuring and analysing the electromagnetic radiation …

Hack a mobile phone’s fingerprint sensor in 15 minutes
Two researchers from Michigan State University’s biometrics group have devised a method for hacking mobile phone’s fingerprint authentication by using just a color …

Android users on high alert as malware, phishing and scams are projected to rise
Android phones are popular and growing more so every day. According to research firm IDC, there were close to 350 million active smartphones worldwide in the second quarter of …
Security update kills several critical bugs in Android Marshmallow
Google’s November Android security update carries fixes for seven vulnerabilities, including two remote code execution flaws that are rated “critical” …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)