The factory reset function of Android smartphones is supposed to delete all apps, files, and settings from the device and restore it to an out-of-the-box state. The process, however, is flawed and leaves a door to recover data. This is why we created the Secure Wipe app for our encrypted communication devices, Secure Phone.
As imperfect as they are, passwords are still the most common method for authentication. And will continue to be at least in the near future. This makes it critical that everyone uses strong passwords. Unfortunately, what the average Internet user considers a decent password is usually a pretty weak one. Here are a few things to consider when coming up with passwords.
Many are already referring to the renewed tension between the West and Russia as Cold War 2.0. However, the world seems unlikely to return to the days of the nuclear scare, and warheads will hopefully be left to rust in peace. Instead, the new theater of confrontation will be cyberspace, with experts predicting cyberwarfare to escalate in 2017 to an intensity we have never seen before.
Are you worried about your online privacy? If you haven’t taken any measures to protect it, yes, you should be. Lucky for you, there is a rapidly growing industry of online security solution providers that would be happy to help you with that problem. These companies offer encrypted communication tools and claim they give you maximum security. Here’s how you should be able to tell apart the encrypted communication providers that you can actually trust.
Ever wondered why would anyone bother to steal something like one billion Yahoo user account names, passwords and email addresses? At first glance, such information doesn’t seem like the most valuable asset. But to those who know how to make use of it, this data is a great tool to commit identity theft, fraud, or simply drain an unsuspecting victim’s banking account. Because of that cybercriminals are willing to pay for your stolen information. Here’s how much.
A few weeks ago we wrote about Samsung Knox, the Korean phone maker’s enterprise mobile security solution, and how it has a history of vulnerabilities and being hacked. We noted that the main problem, even in newer versions where those bugs are fixed, is that Knox sacrifices security in favor of user convenience – and thus, anyone looking for real security should look elsewhere. To further illustrate that point, we decided to put it against our own Secure Phone.
In an age when people do more and more things on their smartphones, getting to a free Wi-Fi hotspot feels like finding an oasis in the middle of the desert. Who wouldn’t prefer to hop on a free network and browse the hell of the Internet without having to worry about a data limit? Well, just like anything else that’s free, wi-fi comes with a fine print. And its reads “data leaks.”
Nowadays, IMSI-catchers are pretty much vanilla surveillance. Such devices have been used by law enforcement and not-so-lawful adversaries alike to seize phone data for over a decade. Now, researchers have demonstrated how the same can be done over Wi-Fi. And it is also relatively easy.
We knew that sooner or later we'll revisit the FBI-Apple dispute about getting access to iPhones. Here we are, proving ourselves right with a piece of big news: Security researcher Sergei Skorobogatov announced he hacked a locked iPhone 5C with basic equipment for under $100!
Do you know what the average Joe, a geek, a businessman, a criminal and the US president have in common? Well, in 2016, they all want nice smartphones. However, they aren't equally paranoid so they eventually end up with different devices. But what if I told you they should be?...