We often repeat that smartphones are inherently flawed in terms of security. The reason is they rely on several technologies that were never intended to provide security. Bluetooth is one such technology – and the BlueBorne attack recently reported by security firm Armis is a reminder of that.
Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.
Ever wondered why would anyone bother to steal something like one billion Yahoo user account names, passwords and email addresses? At first glance, such information doesn’t seem like the most valuable asset. But to those who know how to make use of it, this data is a great tool to commit identity theft, fraud, or simply drain an unsuspecting victim’s banking account. Because of that cybercriminals are willing to pay for your stolen information. Here’s how much.
Encryption might sound like something just hackers, spies, and criminals use. And yeah, those groups of people probably do use it. But this doesn’t mean they are the only ones that have a good reason to do so. You might be thinking that when you have nothing to hide, there’s no need to worry. You couldn’t be more wrong.
Smartphone security is a growing concern. And the biggest smartphone maker by global market share, Samsung, has rightfully moved in to address the issue by offering is own security solution – Samsung Knox. It, however, is rather an illustration as to why you should look for real security elsewhere.
We knew that sooner or later we'll revisit the FBI-Apple dispute about getting access to iPhones. Here we are, proving ourselves right with a piece of big news: Security researcher Sergei Skorobogatov announced he hacked a locked iPhone 5C with basic equipment for under $100!
Welcome to the September mid-month installment of Secure Group’s Security and Privacy Roundup. Our newsletter focuses on relevant news articles about security and privacy issues in the world today, in order to inform our customers and anyone interested in these issues.This is the third installment of our bi-monthly compilation, and we hope it proves informative.
There are a few compelling stories this month worth following. In order to keep things as relevant as possible, the stories are posted in descending order, with the latest entries first. Remember, check out our previous entries as well!
- September 11th - Half of iOS devices running out-of-date versions, putting users at risk
- September 9th - Data Breach captures data from 10.5 million health-care insurance customers
- September 9th - Library Bows to Police Pressure, Suspends Tor Node
- September 7th - New Android Porn malware takes photo and demands your money
- September 3rd - Department of Justice (DOJ) now requires Warrants to be issued for use of ‘Stingrays'
- August 31st - EFF Want to Overturn Florida Case Allowing Warrantless searches of Americans’ Cell Phone Location Records
Earlier this month, we began what we hope to become a regularly updated newsletter rounding up relevant news articles about security and privacy concerns in the world today, in order to inform our customers and anyone interested in these issues.
Two weeks ago, a frightening vulnerability was discovered on Android phones. Dubbed Stagefright, it allows an attacker potential access to higher functions of your phone by simply sending you a text message with attached and infected media, such as a video or audio clip, or a photo. Luckily, this flaw was discovered relatively early by Zimperium zLabs VP of Platform Research and Exploitation, Joshua J. Drake. A patch was also provided by Drake and co. and Google was quickly alerted to the problem and solution both. End of story? Unfortunately no. Patching issues and new vulnerabilities have complicated things, and your android phone may be vulnerable a while yet.
Hot new Encrypted Phone Crumbles at Def Con