Applying a dozen iOS security settings to better protect your mobile device does not sound like a terribly tedious job. So what about Android?
The issue here is that Android as a mobile OS is seemingly the same, yet it is so varied. Its open and flexible nature has made it the leader in the mobile market, but simultaneously it is the basis for the notorious fragmentation issue. In order to protect Android, it presupposes compromises in everyday experiences, but in this case you have to choose between comfort and safety. Ultimately, one can find an optimal balance between convenience and safety and, at least partially, follow the list of tips below.
Read moreSecurity experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life.
An impressive amount of Intelligent devices surround us, but often we ignore the repercussion in term of security and privacy. The IoT devices are designed to improve our experience with technology, but we must consider thta they enlarge our surface of attack. Today we will discuss the risk related to the use of a Smartwatch that is able to dialog with an Android smartphone.
Read moreMicrosoft is gearing up to launch a wearable device within the next few weeks. The gadget is a smart watch that will passively track a wearer’s heart rate and work across different mobile platforms. It will also boast a battery life of more than two days of regular use, sources close to the project say.
That could put it ahead of Samsung’s Galaxy Gear smart watch and Moto 360 which both need to be charged around once a day. The wearable will hit stores soon after launch in a bid to capture the lucrative holiday season, a timeline Apple was reportedly targeting before it delayed its own Watch.
Read moreJawbone wants to become a part of the workday. The company's new service, UP for Groups, will sell discounted fitness trackers to corporate customers who buy in bulk and subscribe to a monitoring service that aggregates data from all the devices.
The target: employers who think nudging their workers toward healthier habits is worth the investment. Jawbone already has been circling the workplace market, and some companies have adopted its bracelets as a way to encourage employees to walk more. But it wasn't until this fall, with the release of Jawbone's cheapest tracking device, that there was an inexpensive option for larger orders.
Read moreThe number of Pre-loaded mobile trojan in the wild is increasing, DeathRing is the last one discovered by the experts. It’s not first the time that Android handsets come preloaded with malware, but cyber security experts are warning of a worrying increase of the cases.
The problem is widespread in Asia and Africa, where criminals are able to compromise the supply chain. Similar cases are frequent for a cheap, low-level devices. Security researchers have detected pre-loaded instances of the DeathRing malware, unfortunately they are not currently aware of where in the supply chain the mobile trojan is installed.
Read moreA secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy.
The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program.
Read moreAndroid tablets and smartphones are ever more popular. And that means your child might well get their small hands on one of them at some point. Kids are increasingly tech-savvy these days, and even a toddler will manage to use your Android smartphone or tablet in ways you didn't know were possible.
While dedicated child tablets are available such as the Vtech Innotab 2S and LeapFrog LeapPad 2 it's more likely you're going to hand over an old phone or spare tablet. Unfortunately even with Android 4.2 Jelly Bean Google has failed to provide any comprehensive parental controls, so we're going to give you some pieces of advice.
Read moreA Vulnerability has been discovered in the wildly popular messaging app WhatsApp, which allows anyone to remotely crash WhatsApp just by sending a specially crafted message. Two India based independent security researchers demonstrated the WhatsApp Message Handler vulnerability to one of our security analyst.
The worried impact of the vulnerability is that the user who received the specially crafted message will have to delete his/her whole conversation and start a fresh chat, because opening the message keeps on crashing WhatsApp unless the chat is deleted completely. What makes it more serious is that one needs to delete entire chat with the person they are chatting to in order to get back whatsapp work in normal.
Read moreData released from a consumer security risks survey found that nearly a third of participants are casual when making online transactions. This action leads to security vulnerability of financial data at risk and poses problems for banks and e-payment systems if they have to refund their clients’ losses.
The study was conducted through an online survey from May to June this year with users from 23 countries. Though users are worried about cyber threats, they still do little to protect themselves. Shocking data shows that children are the most vulnerable Internet users, which poses as a danger for parents.
Read moreVirus analysts explored a new Trojan horse, designed to infect smartphones and tablets running the Android OS. This malicious program is capable of stealing personal information of owners of mobile devices, as well as to steal money from Bank accounts.
To start its malicious activity it can only after installation in the system by the owner of the mobile device. It should be noted that the choice of application for simulation depends entirely on the imagination of writers and can be absolutely anything. Once installed, the Trojan sets up a shortcut on the home screen. In Fact, virus is able to implement on the infected Android device two attack scenario.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland