Categories » Mobile Devices

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones – June 24, 2014

6/24/14 – Wired Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

Report: Chinese phone comes preloaded with spyware – June 17, 2014

6/17/14 – Associated Press Report: Chinese phone comes preloaded with spyware

Be aware, Apple iOS Data protection doesn’t protect email attachments- 2 May 2014

2 May 2014- Security Affairs Be aware, Apple iOS Data protection doesn’t protect email attachments

Unflod Baby Panda” Exploit Targets Jailbroken Iphones- 21 April 2014

21 April 2014 Unflod Baby Panda” Exploit Targets Jailbroken Iphones

Unflod Baby Panda, the Chinese malware hit jailbroken iPhone – April 19, 2014

4/19/2014 – Security Affairs Unflod Baby Panda, the Chinese malware hit jailbroken iPhone

How to Detect Criminal Gangs Using Mobile Phone Data – April 14, 2014

4/14/2014 – Technology Review How to Detect Criminal Gangs Using Mobile Phone Data

Hackers Lurking in Vents and Soda Machines- 7 April 2014

7 April 2014- NY Times Hackers Lurking in Vents and Soda Machines

Wickr Spreads Its ‘Leave No Trace’ Messaging- 1 April 2014

1 April 2014- Dark Reading Wickr Spreads Its ‘Leave No Trace’ Messaging

Malicious apps can hose Android phones, erase data, researchers warn- 24 March 2014

24 March 2014- Ars Technica Malicious apps can hose Android phones, erase data, researchers warn

Hackers develop drone that can steal the info on your phone- 20 March 2014

20 March 2014- Sott.net Hackers develop drone that can steal the info on your phone

Foreign Affairs: The Mobile Finance Revolution- 1 March 2014

1 March 2014- Foreign Affairs Foreign Affairs: The Mobile Finance Revolution

Apple Explains Exactly How Secure iMessage Really Is – February 27, 2014

2/27/2014 – Tech Crunch Apple Explains Exactly How Secure iMessage Really Is

Why Telegram has become the hottest messaging app in the world – February 25, 2014

2/25/2014 – The Verge Why Telegram has become the hottest messaging app in the world

Released a Metasploit module to hack 70% Android devices – February 20, 2014

2/20/2014 – Security Affairs Released a Metasploit module to hack 70% Android devices

Silent Circle & Geeksphone Join Forces To Build Blackphone: A Pro-Privacy Android-Based Smartphone – January 15, 2014

1/15/2014 – “Tech Crunch” Silent Circle & Geeksphone Join Forces To Build Blackphone: A Pro-Privacy Android-Based Smartphone

Snapchat Breach Exposes Weak Security- 2 January 2014

2 January 2014 Snapchat Breach Exposes Weak Security

The Insidiousness of Facebook Messenger’s Mobile App Terms of Service- 1 December 2013

1 December 2013- Huffington Post The Insidiousness of Facebook Messenger’s Mobile App Terms of Service

Smartphones, A Perfect Cyber Espionage and Surveillance Weapon – November 6, 2013

11/6/2013 – The Hacker News Smartphones, A Perfect Cyber Espionage and Surveillance Weapon

>Mobile devices and cyber espionage, principal concerns for governments – November 6, 2013

11/6/2013 – Security Affairs Mobile devices and cyber espionage, principal concerns for governments

Stealthy technique fingerprints smartphones by measuring users’ movements – October 14, 2013

10/14/2013 – Arstechnica Stealthy technique fingerprints smartphones by measuring users’ movements