Mobile Wallets—How I Make Mobile Payments Securely
Some say there will be a day when the wallet you carry in your pocket or purse will become obsolete. The plan is to eliminate all our credit cards, store cards, and IDs and use our mobile phones as our primary means of commerce and identification. The technology behind mobile wallet or mobile POS (point […] more…Are Tablets Just As Vulnerable As Mobile Phones?
With unit sales of smartphones and tablets eclipsing those of desktop and notebook PCs, cybercriminals will continue setting their sights on mobile, and increased mobile Internet use will continue exacerbating security and data breach issues. McAfee Labs™ points out today’s tablets are more powerful than notebooks were just a few years ago. Although their lack […] more…Mobile and Phishing – Why It’s More Dangerous
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and entering login data and other credentials. SMiShing is a version of phishing in which scammers send text messages rather than emails, which, as with phishing emails, appear to have been […] more…17 Bad Mobile Apps Still Up, 700,000+ Downloads So Far
We’ve reported previously that malicious apps were discovered in the official Android app store, which is now known as Google Play. While those reported apps were removed, more malicious apps have been seen in the official marketplace and appear to be still victimizing users. This is just one of the important reasons why we feel […] more…What Are The Risks Of Mobile Spam?
Spammers send unwanted emails or texts that are both annoying and frightening. Most spam messages are useless advertisements selling stuff you don’t need or want. In 1995, 8,069 unique pieces of malware were detected. One out of 20 emails were spam, and the Melissa virus infected hundreds of thousands. By 2010, 54 million unique pieces of malware were […] more…Porn spam campaign redirects web browsers to hardcore websites
SophosLabs has been intercepting an X-rated spam campaign, designed to promote hardcore porn websites. Emails have been spammed out purporting to have an adult video attached, using a variety of names. more…Free Mobile Apps = Drained Battery
Go though your smarphone right now. Look at each app and seriously consider whether you need it. If not, delete it. Then, determine which of the free apps are worth upgrading to the paid versions, since free apps that contain advertising that puts an additional drain on your battery. Using a special energy-profiling tool, researchers […] more…MIT building turned into huge playable Tetris installation
It’s not the first time a building was turned into a giant representation of the video game Tetris, as even in 2000 a Brown University group pulled off a similar stunt on the 10-story Sciences Library, but in that case they had permission of the university; not so in this case. Hackers turned the Massachusetts […] more…Your New Best Friend May Not Protect You
Your mobile phone may arguably be your new best friend. There are few people, places, or things in our lives today that get as many hours of attention as your mobile phone or is with you as often (and for some of us, that means 24/7). Four out of seven people on the planet have […] more…Spring Cleaning Your PC
If your PC is bogged down with useless software and your desktop is jammed with icons and documents, then your PC is next to useless as a productivity tool. Even scarier is the increased likelihood that if you have lost track of your files, you could easily have sensitive personal information exposed without your knowledge. […] more…FCC and Carriers to Create Stolen Phone Consortium
Stolen phones are a big problem here in the US. Many are stolen in robberies. Robberies are, by definition, violent crimes, and there are many instances of robberies of mobile phones that resulted in serious injury or even death. TechNewsWorld reports “Ten years ago, mobile phone thefts accounted for about 8% of New York City’s […] more…Utah Medicaid Breach Serves as Another Wakeup Call
An employee of the Utah State Department of technology must have hit the snooze button when he launched a test server that resulted in the breach of 780,000 Medicaid records including over 250,000 Social Security numbers. The Governor of Utah was quoted in the Salt Lake Tribune saying “Individuals provide sensitive personal information to the […] more…Android Viruses are the Real Deal
Smartphones now make up half of all activated mobile phones. And as we know, smartphones are small computers, capable of performing most of the same functions as a PC, primarily through the use of mobile applications. Some claim that mobile malware threats are still too scarce to worry about. But while PCs definitely remain the […] more…What Happens to Your Profile After You Die?
If you were hit by a bus, and passed on to whatever heaven might exist, would you care about your Facebook page? Probably not. But your loved ones more than likely would. Things like email, websites, and social media profiles are considered “digital assets,” which may have some monetary value, but for the most part […] more…How to Protect Yourself From Malicious Apps
Last year, in order to combat a particularly insidious virus known as DroidDream, Google remotely deleted infected applications from thousands of Android devices. Apps that appeared legitimate were bundled with malware, then distributed via Google’s Android Marketplace. More than 50 infected Android apps were detected and removed. Since then, all app stores have reported infections […] more…How to Protect Your Privacy From “Leaky” Apps
Back in 2010, The Wall Street Journal was already warning us about app developers’ lack of transparency with regard to their intentions. “An examination of 101 popular smartphone “apps”—games and other software applications for iPhone and Android phones—showed that 56 transmitted the phone’s unique device ID to other companies without users’ awareness or consent. Forty-seven […] more…More information
- Twitter hacked, at least 250,000 users affected: what you can do to protect yourself
- US girl loses her father’s $80K settlement after boasting about win on Facebook
- Microsoft Windows Kernel CVE-2019-1065 Local Privilege Escalation Vulnerability
- Google Chromecast and Home Speaker can leak location data to websites
- Attackers used a LinkedIn job ad and Skype call to breach bank’s defences
- What is Trello? A guide to Atlassian’s collaboration and work management tool
- Remote Code Execution Vulnerabilities Found in F5 Products
- Onboarding remote employees doesn’t have to be hard
- Services Provider [24]7.ai Breached, Leaking Customer Data from Delta Airlines, Sears, Kmart, and Best Buy
- Multiple Vulnerabilities Patched in CleanMyMac Utility