A lot of Android apps that have been downloaded 6.3 billion times from the Google Play store are still vulnerable to the FREAK bug. Research published Tuesday by the company shows just how vulnerable both Android and iOS apps still are to a FREAK attack.
FREAK is a cryptographic weakness that permits attackers to force data traveling between a vulnerable website or operating system to servers to use weak encryption protocols. If combined with a so-called man-in-the-middle attack, the data could theoretically be intercepted and cracked as the user is unwittingly using a lower level of encryption than believed.Read more
Being informed is being protected! Safeum Communications ehf. has released a new mobile application TOP Security! for you to stay tuned on the latest security news.
You will learn about latest trends, threats, data leaks and vulnerabilities in popular applications and services. News, analysis, interviews and expert forecasts – we monitor the news and immediately share with you. The most relevant and interesting events and expert opinions are assembled for you. User-friendly menu allows you to sort the news by tags, set up notification settings and change the interface language.Read more
Personal data protection has been one of the trending topics for the past few years. However, all people perceive it differently: someone thinks of governmental control, others do not want to become the victims of online frauds.
Being informed is being protected! Safeum Communications ehf. has released a new mobile application TOP Security! for you to stay tuned on the latest security news. You will learn about latest trends, threats, data leaks and vulnerabilities in popular applications and services. News, analysis, interviews and expert forecasts – we monitor the news and immediately share with you.Read more
A pair of computer scientists based in Europe have found a security vulnerability in the iPhone 5 series of smartphones that could be exploited by malicious software and compromise a user’s personal information.
The security flaw relies on steganography—the practice of hiding a message within another message. It’s related to cryptography, but whereas cryptography is the concealment of a message’s contents, steganography hides the fact that a secret message is being sent at all. Classic examples include embedding a message in a digital photo. But the computer scientists involved in the iPhone exploit have also found ways to hide messages using the network protocols.Read more
The police department of the Chinese city of Wenzhou in southeast China has spent thousands of dollars on a software that installs Trojan horse viruses into mobile phones, allowing police officers to spy on other people's activities on their phones.
Investigative reporter first made the report when he posted on his Sina Weibo page a screenshot of a list of devices that were purchased by the Wenzhou police force and posted on the website of the Wenzhou Economic Technology Department Zone in Zheijiang province. The list includes a lot of Trojan horse viruses for mobile phones and a device that injects the virus into illegally unlocked iOS and Android phones.Read more
How many secrets do you think your iPhone can reveal to strangers? Even when it’s in your hands, placed on the table, or being charged from a laptop it can reveal quite a few — from personal correspondence and photos, to financial information and credentials. So how do you protect yourself? Well, you can follow our tips in order to maximize your iPhone security.
Keep in mind that doing everything we mention here will deprive your iPhone of some of its helpful features, but at the same time it will better protect your private data. You don’t have to follow all of the tips, so feel free to choose what you’re ready to sacrifice for the sake of security — it’s completely up to you.Read more
Microsoft is gearing up to launch a wearable device within the next few weeks. The gadget is a smart watch that will passively track a wearer’s heart rate and work across different mobile platforms. It will also boast a battery life of more than two days of regular use, sources close to the project say.
That could put it ahead of Samsung’s Galaxy Gear smart watch and Moto 360 which both need to be charged around once a day. The wearable will hit stores soon after launch in a bid to capture the lucrative holiday season, a timeline Apple was reportedly targeting before it delayed its own Watch.Read more
Jawbone wants to become a part of the workday. The company's new service, UP for Groups, will sell discounted fitness trackers to corporate customers who buy in bulk and subscribe to a monitoring service that aggregates data from all the devices.
The target: employers who think nudging their workers toward healthier habits is worth the investment. Jawbone already has been circling the workplace market, and some companies have adopted its bracelets as a way to encourage employees to walk more. But it wasn't until this fall, with the release of Jawbone's cheapest tracking device, that there was an inexpensive option for larger orders.Read more
A secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy.
The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program.Read more
Children are crazy about PCs. However, it is important that this enthusiasm be managed properly; without something that we call “kids management,” this interest might turn into obsession and lead to early isolation characteristics with unpredictable consequences.
This obsession may cause children to react to separation from their PCs, as well as their parents’ attempts to bring them back to the real world, with uncontrollable hysterics. Kids management is a complex psychological concept where each parent chooses their own way. The ability to wisely manage ‘tablet entertainment’ is not acquired by default, but instead it is seamlessly integrated into an overall system of education.Read more