smartphones
Yahoo develops cheap, effective biometric smartphone authentication
A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully …
Critical BlackPhone bug allows attackers to spy on users
BlackPhone, a mobile phone aimed at users who want to keep their communications secure from mass surveillance attempts, is affected by a critical security vulnerability that …
One-click mobile fraud variant throws browser for a loop
Symantec researchers have recently encountered a new variant of the old one-click mobile fraud, which results in the users’ mobile browser being thrown in a loop and …
Blackphone security issues and vulnerabilities unveiled
Blackphone, the carrier- and vendor-independent smartphone that was created with the goal of placing privacy and control directly in the hands of its users, is not without its …
9 ways to protect data on your smartphone
Recent headlines of Hollywood celebrities’ nude photos leaking onto the Internet remind us of the privacy risks we face when we store personal data – particularly …
California phone kill-switch law could lead to abuse
On Monday, California Governor Jerry Brown signed into law a bill (SB 962) that will require any smartphone sold in the state after July 1, 2015, to include a software or …
Sneak attack through smartphone shared memory
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of …
Blackphone rooted at DEF CON?
Blackphone, the recently released security-oriented smartphone, has apparently been rooted. The feat was executed at the DEF CON hacker conference, where Jon Sawyer …
Risks of selling used smartphones
AVAST Software easily retrieved personal data from used smartphones sold online, despite consumers deleting their data. From the used devices, researchers was able to recover …
Cops must get a warrant before looking through cellphone content
The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can’t search the contents of an arrested individual’s cell phone(s) …
Authorization model for home automation
Smartphones promise to play an important role in the management and control of Home Automation (HA) solutions. When things and devices have either no or a constrained user …
Apps on your Android phone can take photos without you knowing
A researcher has demonstrated that it’s possible for malicious attackers to create an Android app that will surreptitiously take pictures and upload them to a remote …