Read more about smartphones
Bookmark and Share
  • Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims

    17.06.2015

    A vulnerability in the Swift keyboard, which comes pre-installed on Samsung mobile devices, can be exploited by remote attackers to secretly install malicious apps, access the device's camera and microphone and more, claims NowSecure security researcher Ryan Welton.

  • Researchers track Android users by collecting accelerator readings

    26.05.2015

    A group of researchers from Nanjing University, China, have demonstrated that Android users' movements can be tracked by simply analyzing the data provided by the devices' accelerometers and orientation sensors.

  • Sniffing and tracking wearable tech and smartphones

    25.05.2015

    Researchers at Context Information Security have demonstrated how easy it is to monitor and record Bluetooth Low Energy signals transmitted by many mobile phones, wearable devices and iBeacons, including the iPhone and leading fitness monitors, raising concerns about privacy and confidentiality.

  • Yahoo develops cheap, effective biometric smartphone authentication

    30.04.2015

    A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully used to authenticate users to their mobile phones.

  • Critical BlackPhone bug allows attackers to spy on users

    28.01.2015

    BlackPhone, a mobile phone aimed at users who want to keep their communications secure from mass surveillance attempts, is affected by a critical security vulnerability that can be exploited to reveal users' contacts, the content of their (encrypted) messages, and their location information, as well as to load additional code that can lead to the attacker having complete control over the handset.




Spotlight

Researcher tests Tor exit nodes, finds not all operators can be trusted

A security researcher that goes by the name Chloe recently tested around 1,400 Tor exit nodes by setting up a Bitcoin-themed phishing site.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Jun 29th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //