Donald Trump's phone use is raising security concerns among a pair of senate Democrats. Sens. Tom Carper and Claire McCaskill sent a letter last week to Secretary of Defense James Mattis about whether the president is using a secure device to make calls and post tweets.
The senators, who both service on the Homeland Security Committee, worry that an unsecured device could be vulnerable to hacking, posing a national security risk. "Public reports originally indicated that President Trump began using a 'secure, encrypted device approved by the U.S. Secret Service' prior to taking office," the senators wrote in the letter, which was made public Monday.Read more
An alarming number of Android VPNs are providing a decidedly false sense of security to users, especially those living in areas where communication is censored or technology is crucial to the privacy and physical security.
A study published recently identified a number of shortcomings common to high percentages of 238 mobile VPN apps analyzed by a handful of researchers. Users downloading and installing these apps expecting secure communication and connections to private networks are instead using apps that lack encryption, are infected with malware, intercept TLS traffic, track user activity, and manipulate HTTP traffic.Read more
Someone send Samsung's pr people some biscuits or something, they could do with a break.
Not only have the poor bastards had to endure the news that the company that they work for released a phone that can catch fire, but now a security firm called Context says that its Galaxy phones are vulnerable to an SMS attack that can be triggered remotely and turn users' devices into the sort of thing that young people in pyjamas are supposed to rescue from the floor of swimming pools. A brick. Context starts by telling us that Android phones are vulnerable to these SMS attacks and that the victim will be subjected to ransomware shakedowns.Read more
President Trump has carried his Twitter habit into his presidency. He has also brought with him another tech habit that is causing concern. Mr. Trump has been using his old, unsecured Android phone to post on Twitter since moving to Washington late last week.
The president’s use of an unsecured personal device raises concerns that his desire to use his old smartphone could be exposing him and the nation to security threats. He is using the Android smartphone mainly to post on Twitter, not to make calls. But it’s unclear what security measures have been put in place on the device and how vulnerable he could be to someone stealing data or breaking into his Twitter account.Read more
A few hours after President-elect Donald Trump was briefed by intelligence officials about Russian meddling in the election, a reporter called his cellphone seeking an interview. The call went to voicemail and the reporter did not leave a message. About an hour later, Trump called back.
It's hard to imagine many politicians — particularly one about to become president of the United States — calling back an unknown number on their cellphone. With Trump, it's simply how business gets done, whether he's fielding calls from real estate partners and longtime friends or foreign leaders and congressional lawmakers in the weeks after the election.Read more
After the success of Pokémon Go, Nintendo's "Super Mario Run" has become the hottest game to hit the market with enormous popularity and massive social impact. The game has taken the world by storm since its launch for iOS devices over a week ago.
Can you believe — it was downloaded more than 40 million times worldwide in its first four days of release. But if you have downloaded a Super Mario Run APK for your Android device, Beware! That's definitely a malware. Since Super Mario Run has currently been released only for iOS devices and is not on Google Play, it caused a lot of disappointment among Android users.Read more
One of the most important pieces of advice on cybersecurity is that you should never input logins, passwords, credit card information, and so forth, if you think the page URL looks weird. Weird links are sometimes a sign of danger. If you see, say, fasebook.com instead of facebook.com, that link is weird.
But what if the fake Web page is hosted on the legitimate page? It turns out this scenario is actually plausible — and the bad guys don’t even need to hack the server that hosts the target page. Let’s examine how it works. The trick here is in the way our normal-looking Web page addresses are an add-on to real the IP addresses the Internet works with.Read more
Google will be launching two new flagship smartwatches in the first quarter of next year, according to Jeff Chang, product manager of Android Wear at Google. In an exclusive interview, Chang said that the new watches will be the flagship Android Wear 2.0 devices and will be the first ones to launch with the new platform.
The new smartwatches had been rumored before, but Google confirmed the upcoming launch today as part of a larger effort to convince consumers that wearables — smartwatches specifically — are still in demand. The new models will not have Google or Pixel branding, but will be branded by the company that is manufacturing them.Read more
A team of computer hackers have demonstrated how the Tesla Model S can be located, unlocked and driven away without the key. By compromising the car's companion smartphone application, they used a laptop to remotely unlock the doors, start the electric car and 'steal' it from a colleague.
The hack exposes the internet weaknesses of products which can be accessed via apps and the internet. The Tesla app is commonly used by owners to check the battery level and charging status, see the location of their car, as well as set the climate control before getting in, and flash the lights to help find the car in a car park.Read more
Do you own an Android smartphone? You could be one of those 700 Million users whose phone is secretly sending text messages to China every 72 hours. You heard that right.
Over 700 Million Android smartphones contain a secret 'backdoor' that surreptitiously sends all your text messages, call log, contact list, location history, and app data to China every 72 hours. Security researchers from Kryptowire discovered the alleged backdoor hidden in the firmware of many budget Android smartphones sold in the United States, which covertly gathers data on phone owners and sends it to a Chinese server without users knowing.Read more