A newly disclosed vulnerability in Skype for Android could be exploited by miscreants to bypass an Android phone's passcode screen to view photos, contacts, and even launch browser windows.
Big wireless has borrowed the very same strategy and tactics big tobacco and big oil pioneered to deceive the public about the risks of smoking and climate change. War-gaming science involves playing offence as well as defence – funding studies friendly to the industry while attacking studies that raise questions; placing industry-friendly experts on advisory bodies such as the World Health Organisation and seeking to discredit scientists whose views differ from the industry’s.
Data centres and smartphones will be the most damaging information and communications technologies to the environment by 2040, according to new research.
The Messenger application offers to conveniently track all your calls and messages. But Facebook was already doing this surreptitiously on some Android devices until October 2017, exploiting the way an older Android API handled permissions.
As users continue to delete their Facebook accounts in the wake of the Cambridge Analytica scandal, a number are discovering that the social network holds far more data about them than they expected, including complete logs of incoming and outgoing calls and SMS messages.
Spanish authorities used the geolocation service on the mobile phone of at least one of Puigdemont’s companions to monitor his movements, as well as fitting a tracking device to the Renault Espace the group had been travelling in.
A newly discovered strain of Android malware makes live recordings of ambient audio around an infected device.
As banks have upped their security systems, fraudsters have realised mobile phone security is much easier to get around, and can be the key to accessing a bank account. The cases should serve as a warning to anyone who uses their mobile phone to verify themselves to their bank – by one-time passcodes or similar.
The Stingray/ GSM interceptor/IMSI catcher is equipment that can gather data from hundreds of phones over targeted areas and they can also perform denial-of-service attacks on phones and intercept conversations.
Researchers at the University of Washington are trying to simplify so-called smart fabrics by focusing on magnetized textiles that can store small amounts of data readable by a magnetometer, including the ones inside most smartphones. It’s potentially useful for invisibly labeling your stuff, or using a shirt or bracelet in place of a password or key card.
Theoretically, it is logical that anyone who has downloaded and installed the Ai.Type virtual keyboard on their phone has had all of their phone data exposed publicly online.
There's a good chance at least some of your Android apps have tracked you rather more than you expect.
Google has confirmed it has been able to track the location of Android users via the addresses of local mobile phone masts, even when location services were turned off and the sim cards removed.
Many health apps designed to assist dementia patients and their caregivers have inadequate security policies or lack security policies altogether.
Phones sold by the California-based Spyfones track the user without their knowledge, monitoring everything from location, messages and emails to call history, searches and app use. They are aimed at companies that wish to guard against improper usage and also offer “spousal peace of mind”.
A handful of people, working at a handful of technology companies, through their choices will steer what a billion people are thinking today.
Uber’s iPhone app has a secret backdoor to powerful Apple features, allowing the ride-hailing service to potentially record a user’s screen and access other personal information without their knowledge.
Having a smartphone within sight or within easy reach reduces a person’s ability to focus and perform tasks because part of their brain is actively working to not pick up or use the phone.
Somehow, the masses have been led to believe that phone numbers are inextricably bound to identities and therefore make good authentication tools. The painful reality is that your telco operates at the security level of a third-rate coat check. Do not mistake a phone number for an identity. Try to stick to services where you actually own your identity, where your communications are private, and where you can authenticate your interlocutor.
In a growing number of online attacks, hackers have been calling up Verizon, T-Mobile U.S., Sprint and AT&T and asking them to transfer control of a victim’s phone number to a device under the control of the hackers. Once they get control of the phone number, they can reset the passwords on every account that uses the phone number as a security backup — as services like Google, Twitter and Facebook suggest.