A quickly rising threat is hiding within literally thousands of Android apps available on various app stores, CSO Online has recently reported. It's dubbed DressCode and is particularly dangerous because it can infiltrate whatever internet network the infected device connects to.
A single day doesn't pass without authorities or politicians trying to bridle encryption. They push for backdoors in software and devices, closely monitor encryption software and service providers, and keep an even closer eye on way too many people. So many people come to ask: "Is encryption a crime?".
No matter how much you try to secure a normal smartphone, it will still remain a normal smartphone. This was proved yet again by security researcher Jon Sawyer, who's discovered a backdoor in Android firmware provided by manufacturer Foxconn. The vulnerability allows attackers to root devices to which they have physical access. In other words, to take full control over the device.
If your communication is sensitive or you have access to confidential data from your phone, you may think that your phone is your weakness. And you'll be right because mobile devices are the weakest link in security according to the latest Tech Pro Research survey of chief information officers, technology executives, and IT employees. But what if I told you it's mostly because of you?
Yahoo Mail just received another blow to its already crippled reputation. Citing "people familiar with the matter", Reuters reported that last year Yahoo Inc secretly collaborated with US intelligence officials to develop custom software that scrapes all of its users' incoming emails for specific information. In real time!
When Snowden revealed in 2013 that the UK Government intercepted nearly every bit of information and communication across its territory and had broad access to US mass surveillance data, it was a shock. What's more shocking, though, is that these practices continue to violate the basic rights of hundreds of millions of people. However, 10 privacy organizations are here to stop it, and they mean it.
So BlackBerry finally broke the "news". It won't make its own phones anymore. Rather, it'll let partners manufacture them, then just stamp its logo on top. Kind of exactly what it did with the DTEK50!? Right. So now that we have this official confirmation, we can't help but ask the big question. What will this mean for BlackBerry security?
We knew that sooner or later we'll revisit the FBI-Apple dispute about getting access to iPhones. Here we are, proving ourselves right with a piece of big news: Security researcher Sergei Skorobogatov announced he hacked a locked iPhone 5C with basic equipment for under $100!
With encryption already starting to go mainstream, chances are you're finally considering adopting it to protect your data and communication. But where do you start from? An app? Several apps? An entire secure phone? We're here to help you out with our neat Secure Pack vs Secure Phone comparison.
It's generally known email and IM communication can be encrypted when privacy and security are highly necessary. But what about voice? That time when you need to call someone and discuss a sensitive matter. How can you make sure your phone isn't tapped? 10-15 years ago, you would've probably been left with your guard down. Today, not anymore, thanks to ZRTP encryption for voice.