Hackers have figured out how to persuade iPhone users to install malicious apps on their iPhones without their knowledge. The apps may look and perform like the real thing, but they're controlled by hackers.
The installations occur when users unwittingly click on web links that trigger the downloads. Bogus apps include malware versions of Twitter, Facebook, WhatsApp. The attacks work by duping smartphone users into installing the malicious apps without their knowledge. If a user clicks on an infected link while browsing the web, then Masque can download an app onto an iPhone without the users knowing.Read more
A research study conducted by Hewlett-Packard has found serious security issues in today's top smartwatch wearable devices. Smartwatches are part of the wearable device trend, which extends from medical devices and fitness trackers to acting as an extension of your smartphone.
The Apple Watch and Android Wear are examples of popular wearable devices on the market which can pair with smartphones and allow you to view online notifications, send messages and control apps through either the small display or through voice control. Every one of the ten devices analyzed contained significant vulnerabilities.Read more
Data stolen from Hacking Team continues to yield information about the company’s infiltration techniques. The latest find is a fake Android news app, which was used to install its flagship surveillance tool. The app is called “BeNews,” the same name as a long-shuttered news website.
Inside the app is a backdoor that appears to have been used to load the Android version of Hacking Team’s Remote Control System, also known as Galileo, a data-collecting tool the company sold to law enforcement and security agencies worldwide. That malicious component takes advantage of a local privilege escalation vulnerability.Read more
If you're writing poetry, write it. Don't type it in just because you can. The classroom is changing, as new technologies dramatically alter the learning for both teachers and students. And at the heart of this change is the tablet.
You might not think of the classroom as a key market for big companies such as Apple and Google. That's indicative of a vast worldwide market. Manufacturers understandably want their share – and it comes with some significant benefits to education too. What's been clear from looking at how the tablet is currently used in the classroom is that it's had a transformational effect.Read more
A lot of Android apps that have been downloaded 6.3 billion times from the Google Play store are still vulnerable to the FREAK bug. Research published Tuesday by the company shows just how vulnerable both Android and iOS apps still are to a FREAK attack.
FREAK is a cryptographic weakness that permits attackers to force data traveling between a vulnerable website or operating system to servers to use weak encryption protocols. If combined with a so-called man-in-the-middle attack, the data could theoretically be intercepted and cracked as the user is unwittingly using a lower level of encryption than believed.Read more
Being informed is being protected! Safeum Communications ehf. has released a new mobile application TOP Security! for you to stay tuned on the latest security news.
You will learn about latest trends, threats, data leaks and vulnerabilities in popular applications and services. News, analysis, interviews and expert forecasts – we monitor the news and immediately share with you. The most relevant and interesting events and expert opinions are assembled for you. User-friendly menu allows you to sort the news by tags, set up notification settings and change the interface language.Read more
Personal data protection has been one of the trending topics for the past few years. However, all people perceive it differently: someone thinks of governmental control, others do not want to become the victims of online frauds.
Being informed is being protected! Safeum Communications ehf. has released a new mobile application TOP Security! for you to stay tuned on the latest security news. You will learn about latest trends, threats, data leaks and vulnerabilities in popular applications and services. News, analysis, interviews and expert forecasts – we monitor the news and immediately share with you.Read more
A pair of computer scientists based in Europe have found a security vulnerability in the iPhone 5 series of smartphones that could be exploited by malicious software and compromise a user’s personal information.
The security flaw relies on steganography—the practice of hiding a message within another message. It’s related to cryptography, but whereas cryptography is the concealment of a message’s contents, steganography hides the fact that a secret message is being sent at all. Classic examples include embedding a message in a digital photo. But the computer scientists involved in the iPhone exploit have also found ways to hide messages using the network protocols.Read more
The police department of the Chinese city of Wenzhou in southeast China has spent thousands of dollars on a software that installs Trojan horse viruses into mobile phones, allowing police officers to spy on other people's activities on their phones.
Investigative reporter first made the report when he posted on his Sina Weibo page a screenshot of a list of devices that were purchased by the Wenzhou police force and posted on the website of the Wenzhou Economic Technology Department Zone in Zheijiang province. The list includes a lot of Trojan horse viruses for mobile phones and a device that injects the virus into illegally unlocked iOS and Android phones.Read more
How many secrets do you think your iPhone can reveal to strangers? Even when it’s in your hands, placed on the table, or being charged from a laptop it can reveal quite a few — from personal correspondence and photos, to financial information and credentials. So how do you protect yourself? Well, you can follow our tips in order to maximize your iPhone security.
Keep in mind that doing everything we mention here will deprive your iPhone of some of its helpful features, but at the same time it will better protect your private data. You don’t have to follow all of the tips, so feel free to choose what you’re ready to sacrifice for the sake of security — it’s completely up to you.Read more