#mobile-security

[ follow ]
#cybersecurity
fromTechCrunch
2 weeks ago
Mobile UX

Chinese authorities are using a new tool to hack seized phones and extract data | TechCrunch

fromArs Technica
3 months ago
Mobile UX

iOS and Android juice jacking defenses have been trivial to bypass for years

New ChoiceJacking attack technique allows malicious chargers to steal data from phones, exploiting flaws in previous mitigations adopted by Apple and Google.
fromTechCrunch
2 weeks ago
Mobile UX

Chinese authorities are using a new tool to hack seized phones and extract data | TechCrunch

Mobile UX
fromArs Technica
3 months ago

iOS and Android juice jacking defenses have been trivial to bypass for years

New ChoiceJacking attack technique allows malicious chargers to steal data from phones, exploiting flaws in previous mitigations adopted by Apple and Google.
Mobile UX
fromZDNET
1 week ago

Google Chrome for iOS now lets you switch between personal and work accounts

Google expands Chrome account switching feature on iOS, improving separation of work and personal tasks.
#phishing
Information security
fromSecuritymagazine
3 months ago

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
Mobile UX
fromDevOps.com
3 weeks ago

INE Security Launches Enhanced eMAPT Certification - DevOps.com

eMAPT certification offers the industry's most comprehensive approach to mobile application penetration testing.
#samsung
fromZDNET
3 weeks ago
Privacy professionals

The biggest AI feature announced at Samsung Unpacked was also the most subtle

fromZDNET
3 weeks ago
Privacy professionals

The biggest AI feature announced at Samsung Unpacked was also the most subtle

fromLondon Business News | Londonlovesbusiness.com
4 weeks ago

How to unlock a Samsung phone without losing any data - London Business News | Londonlovesbusiness.com

Forgotten PIN, Password, or Pattern is a common cause of being locked out of Samsung devices, especially if they have not been used recently.
Mobile UX
fromThe Verge
4 weeks ago

AT&T now lets you lock down your account to prevent SIM swapping attacks

AT&T's new Account Lock feature protects wireless users against unauthorized account changes, including phone number transfers and SIM card changes, significantly reducing the risk of SIM swapping attacks.
Privacy technologies
fromZDNET
1 month ago

Your Android phone is getting a big security upgrade for free - here's what's new

Google enhances Android security to protect users from scams and unauthorized actions.
#android-16
fromZDNET
1 month ago
Mobile UX

Your Android phone just got a major upgrade for free - including these Pixel models

fromZDNET
1 month ago
Mobile UX

Your Android phone just got a big upgrade for free - these Pixel models included

Mobile UX
fromZDNET
1 month ago

Your Android phone just got a major feature upgrade for free - including these Pixel models

Android 16 features streamlined updates and enhanced security, focusing on user convenience and protection for sensitive accounts.
fromZDNET
1 month ago
Mobile UX

Your Android phone just got a major upgrade for free - including these Pixel models

fromZDNET
1 month ago
Mobile UX

Your Android phone just got a big upgrade for free - these Pixel models included

Mobile UX
fromZDNET
1 month ago

Your Android phone just got a major feature upgrade for free - including these Pixel models

Android 16 features streamlined updates and enhanced security, focusing on user convenience and protection for sensitive accounts.
UK news
fromwww.independent.co.uk
1 month ago

Martin Lewis shares how to keep mobile bills down and would-be thieves at bay

The Independent champions accessible journalism on crucial issues, advocating for unfiltered reporting without paywalls.
#phishing-attacks
Privacy professionals
fromSecuritymagazine
7 months ago

Executives targeted in mobile spearphishing attacks

Organizations need advanced, AI-driven solutions to defend against sophisticated mobile phishing campaigns.
Implementing comprehensive mobile defense strategies is crucial to reducing vulnerabilities.
Privacy professionals
fromSecuritymagazine
7 months ago

Executives targeted in mobile spearphishing attacks

Organizations need advanced, AI-driven solutions to defend against sophisticated mobile phishing campaigns.
Implementing comprehensive mobile defense strategies is crucial to reducing vulnerabilities.
fromZDNET
1 month ago

Your Android phone is getting new security protections - and it's a big deal for enterprises

Google's Android Enterprise platform enhances mobile security for organizations, addressing vulnerabilities in unmanaged devices.
fromTechCrunch
1 month ago

Phone unlocking firm Cellebrite to acquire mobile testing startup Corellium for $170M | TechCrunch

Cellebrite, known for its forensic tools to unlock smartphones, is acquiring Corellium for $170 million to enhance mobile security testing capabilities.
Tech industry
fromwww.bbc.com
2 months ago

Phone theft victim loses 35,000 after device stolen

Kush Chaudary, a phone theft victim, lost over £35,000 after thieves stole his phone and quickly changed his passcode, highlighting the urgency of device security.
London startup
Digital life
fromZDNET
2 months ago

7 ways to thwart phone thieves - and avoid China's infamous 'stolen iPhone building'

Stolen smartphones often end up in Shenzhen's Huaqiangbei district, especially in the Feiyang Times building, which has a reputation for trafficking stolen devices.
fromZDNET
2 months ago

6 hidden Android features that make my life easier - and that you're overlooking

There are hidden Android features that can enhance the user experience, simplifying tasks and improving security.
fromComputerWeekly.com
3 months ago

Ofcom bans leasing of Global Titles to crackdown on spoofing | Computer Weekly

Ofcom is banning the leasing of Global Titles to protect mobile users' privacy and security from potential criminal interception.
Roam Research
fromNextgov.com
3 months ago

Chinese telcos provide backbone for US allies' mobile traffic, raising espionage concerns

Chinese telecom infrastructure poses risks to international mobile traffic security for various countries.
Over 60 mobile operators rely on Chinese networks for routing sensitive data.
fromThe Hacker News
4 months ago

PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps

PJobRAT, an Android malware previously targeting Indian military personnel, has been linked to a new campaign likely aimed at Taiwan users disguised as chat apps.
Roam Research
fromwww.theguardian.com
4 months ago

It's war and peace with Donald and Pete and the worst group chat the world has ever seen | Marina Hyde

Mobile phones pose significant security risks for national security advisers, urging a re-evaluation of their use at sensitive levels.
fromSecuritymagazine
4 months ago

Rooted mobile devices are 250 times more vulnerable

Rooted and jailbroken devices pose significant security risks to users and enterprises, with a high likelihood of malware targeting.
Wearables
fromTechzine Global
5 months ago

Qualcomm stretches Snapdragon 8 Elite lifespan: eight years of support

Qualcomm Snapdragon 8 Elite processors will receive 8 years of software and security updates, enhancing Android smartphone longevity.
fromTelecompetitor
8 months ago

CCA Launches SNAP for Wireless Authentication

SNAP by ClearSky Technologies enhances network security and efficiency for regional wireless carriers, benefiting millions of users.
fromGSMArena.com
8 months ago

OnePlus 13 under-display FP scanner is made by Goodix

The ultrasonic fingerprint scanner by Goodix allows unlocking the phone with wet or dirty fingers, making it a convenient solution for users in everyday scenarios.
Mobile UX
[ Load more ]