Mobile

Headlines : News Security News   Page 1    



What is penetration testing? The basics and requirements - CSO Online - CSO - 22/11 6:53 am

CSO Online What is penetration testing? The basics and requirements CSO Online Like every other IT security discipline, professional pen testing is maturing. Standalone hackers who simply show technical prowess without professionalism and sophistication are becoming less in demand. Employers are looking for the complete ...





US prosecutors charge Iranian in 'Game of Thrones' hack - Reuters - Reuters - 21/11 11:57 pm

Reuters US prosecutors charge Iranian in 'Game of Thrones' hack Reuters Kim described Mesri as an experienced and sophisticated hacker who has been wreaking havoc on computer systems around the world for some time. Prosecutors said Mesri had worked on behalf of Iran's military to attack military systems, nuclear software... 'Game of Thrones' alleged hacker hit with charges in US CNET Feds Say This Iranian Hacker Tried To Extort HBO For $6M -- Here's What We Know About Him Forbes Iranian ..





Android Exploit Allows Attackers to Record Screen & Audio - GeekReply - Geekreply - 21/11 3:09 pm

GeekReply (press release) (blog) Android Exploit Allows Attackers to Record Screen & Audio GeekReply (press release) (blog) Android smartphones running Lolipop, Marshmallow, and Nougat, are vulnerable to an attack that exploits the MediaProjection service to capture the user's screen and record system audio. The MediaProjection service is an Android service that is capable ...





Child sex sting prompts warning for parents to monitor online and .. - Katu - 21/11 2:56 pm

KATU Child sex sting prompts warning for parents to monitor online and smartphone use KATU The upcoming Thanksgiving holiday and winter break could give children more time to spend online and on smartphones . A recent child sex sting has members of ... Online, he said children can be trusting and vulnerable . "The folks that get on these apps





Action News Investigation: Key fob hacking - 6abc.com - 6abc - 21/11 1:05 pm

6abc.com Action News Investigation: Key fob hacking 6abc.com Roger Morris with the National Insurance Crime Bureau says car thieves have essentially become sophisticated computer hackers . "Today's cars are nothing but computers on wheels," said Morris. And, they are using what is known as a relay attack device ...





Blueborne discovered to affect Amazon Echo and Google Home - The Internet .. - Internetofbusiness - 21/11 4:51 am

The Internet of Business (blog) Blueborne discovered to affect Amazon Echo and Google Home The Internet of Business (blog) The flaw was shown to be affect many devices using Bluetooth connectivity from smartphones to medical devices potentially enabling hackers to take control of them and spread the malware 'over the air' to other vulnerable systems. Now, in an update,... Amazon Echo and Google Home patched against BlueBorne threat Naked Security





MediaProjection: Android Service Allows Hackers To Record Audio, Screen .. - Ibtimes - 21/11 2:31 am

International Business Times MediaProjection: Android Service Allows Hackers To Record Audio, Screen Activity International Business Times The vast majority of Android smartphones in use today are vulnerable to an exploit that would allow a hacker to hijack the smartphone and record system audio and a person's on-screen activity, according to MWR Labs. Android smartphones and tablets... New Android Hack Tricks Users Into Recording Screens TechFrag





How a Wi-Fi Pineapple Can Steal Your Data (And How to Protect Yourself .. - Vice - 21/11 1:45 am

Motherboard How a Wi-Fi Pineapple Can Steal Your Data (And How to Protect Yourself From It) Motherboard The Pineapple allows pentesters to easily execute sophisticated attacks on public Wi-Fi networks to see how the attacks work and how to protect the network from those attacks. Pineapples aren't much different than the normal Wi-Fi ... Hak5 makes a few ...





Hacking Back in Black: Legal and Policy Concerns with the Updated Active .. - Justsecurity - 20/11 9:39 pm

Just Security Hacking Back in Black: Legal and Policy Concerns with the Updated Active Cyber Defense Certainty Act Just Security For years now, there has been a discussion surrounding the feasibility of active cyber defense, and allowing private entities or individuals to hack back against hostile cyber activity, but there has not been a major push in Congress to explicitly ...





IPhone rarely targeted by malware: Nokia intelligence report - Deccan .. - Deccanchronicle - 20/11 1:07 pm

Deccan Chronicle iPhone rarely targeted by malware: Nokia intelligence report Deccan Chronicle Other than the desktop and network threats, Android smartphones were the worst, where even efforts from Google to secure their mobile operating system platform and Android ecosystem are being overpowered by attackers. 'Android remains the main target





Money, espionage and image: Why North Korean hackers are making waves - .. - Globalnews - 20/11 12:04 am

Globalnews.ca Money, espionage and image: Why North Korean hackers are making waves Globalnews.ca In the last few years, North Korean hackers have also been blamed for cyberattacks on media companies like Sony and the U.K.'s Channel Four, international banks and the infamous WannaCry ransomware that shut down various hospitals in the U.K. last...





Teenage depression and suicide are way up and so is smartphone use - .. - Washingtonpost - 19/11 10:09 pm

Washington Post Teenage depression and suicide are way up and so is smartphone use Washington Post Around 2012, something started going wrong in the lives of teens. In just the five years between 2010 and 2015, the number of U.S. teens who felt useless and joyless classic symptoms of depression surged 33 percent in large national surveys.





Hackers from China break into secret Indian government video chat - The .. - Newindianexpress - 19/11 10:07 am

The New Indian Express Hackers from China break into secret Indian government video chat The New Indian Express The message from the hackers was clear: they could turn the tap anytime they want due to our lax cybersecurity apparatus. The way Chinese hackers hooked up to the most sophisticated and secret link is shocking and shows they could easily exploit





Apple's Future iPhone X Models May Come With a Surprise - Fortune - Fortune - 18/11 10:01 pm

The Indian Express Apple's Future iPhone X Models May Come With a Surprise Fortune Over the last several days, several reports have suggested that Apple is making progress in developing new technology for future iPhone X models. And there's a good chance that the company's investment in augmented realitya technology that places... Gadget Daddy: Buying an iPhone X? Buy the protection too The Ledger Review: The iPhone X is the best phone for business, period. Computerworld





Gadget Daddy: Buying an iPhone X? Buy the protection too - The Ledger - Theledger - 18/11 2:08 am

Techworld Australia Gadget Daddy: Buying an iPhone X? Buy the protection too The Ledger The good: Displaymate, which does exhaustive evaluations of monitors, smartphones and watch screens, designated the iPhone X display as the best it has ever tested. The bad: SquareTrade, which provides warranties for various electronic devices, labeled ... Review: The iPhone X is the best phone for business, period. Techworld Australia





What is two-factor authentication? - IT PRO - Itpro - 18/11 12:13 am

IT PRO What is two-factor authentication? IT PRO Thanks to the rise of sophisticated hacking , clandestine malware, and clever social engineering techniques, simple username and password protection is no longer enough to keep your online accounts safe from saboteurs and cyber thieves. If someone with





Government Outlines When It Will Disclose Or Exploit Software .. - NPR - 18/11 12:04 am

NPR Government Outlines When It Will Disclose Or Exploit Software Vulnerabilities NPR A hacking group called the Shadow Brokers stole and leaked " sophisticated , very sensitive, high-end, really weapons-grade computer code" from the NSA, former NSA General Counsel Matthew Olsen told NPR this week. "The agency regarded as the world's





Neighborhoods downslope of La Tuna Fire vulnerable to mudslides - 89.3 KPCC - Scpr - 17/11 9:51 pm

89.3 KPCC Neighborhoods downslope of La Tuna Fire vulnerable to mudslides 89.3 KPCC Los Angeles city has been working to identify cell phone towers within the burn area, creating a "geo-fence" boundary within which smart phones can receive emergency messages. The LAPD has been testing the system and on Wednesday sent out a test...





Despite Warnings from US Government, Some Software Companies Leave Holes .. - Govtech - 17/11 4:19 am

Government Technology Despite Warnings from US Government, Some Software Companies Leave Holes in Products Government Technology The debate surged in April when a murky group known as the Shadow Brokers began releasing what it said were sophisticated hacking tools filched from the NSA. Criminal groups used some of the coding from those hacking tools in global attacks in May and... White House goes public with bug disclosure policy FCW.com





Ambient computing puts us at greater risk from hackers - Windows Central - Windowscentral - 17/11 2:01 am

Windows Central Ambient computing puts us at greater risk from hackers Windows Central Our smartphones are also the hub for emerging technologies such digital assistants, smart homes, connected c





The US Military's Favorite Cyber Platform - Bloomberg - Bloomberg - 16/11 11:15 pm

Bloomberg The US Military's Favorite Cyber Platform Bloomberg The nine-year-old company's gear is sophisticated enough to detect hacking techniques that have never been cataloged by tracking minute upticks in computer processing power. Yet the platform is also meant to be foolproof, responding to voice commands...





Cyber Insecurity: the high stakes of data protection in an interconnected .. - OBJ - 16/11 8:48 pm

Ottawa Business Journal Cyber Insecurity: the high stakes of data protection in an interconnected world Ottawa Business Journal Cybersecurity experts fear government and corporate defensive capabilities are not keeping pace with growing ranks of sophisticated hackers , a sentiment underscored by recent events. This week The New York Times reported that the National Security





Do you own this type of phone? All your private photos might be ... - The .. - SUN - 16/11 7:32 pm

The Sun Do you own this type of phone? All your private photos might be ... The Sun OWNERS of OnePlus smartphones have been warned that their private photos and location could be exposed. The gadgets come with an app that could be





Nokia study damns Android security; Calls Google's mobile OS the most .. - Mysmartprice - 16/11 3:28 pm

Motherboard Nokia study damns Android security; Calls Google's mobile OS the most vulnerable platform MySmartPrice Gear It's hasn't been long since Nokia dropkicked Windows and came back from the grave to embrace Android. It looks like the Finnish smartphone maker has finally had an epiphany and now decided to tell us something we already know that Android, isn't all... The Motherboard Guide to Not Getting Hacked Motherboard





Smartphones Stressed Kids - MyStateline.com - Mystateline - 16/11 11:39 am

MyStateline.com Smartphones Stressed Kids MyStateline.com Local therapist and founder of kp counseling Kevin Polky says smartphones alone may not cause depression, but for someone in a dark place they could trigger feelings of loneliness and sadness. Polky says, "Adolescence as we know is a vulnerable time...





US intelligence warns high-tech firms of flaws in software and often .. - Sacbee - 16/11 5:17 am

CNET US intelligence warns high-tech firms of flaws in software and often gets ignored Sacramento Bee The debate surged in April when a murky group known as the Shadow Brokers began releasing what it said were sophisticated hacking tools filched from the NSA. Criminal groups used some of the coding from those hacking tools in global attacks in May and... Trump administration releases rules on disclosing cyber flaws Reuters White House goes public with bug disclosure policy FCW.com





Amazon Echo and Google Home were vulnerable to Bluetooth exploit - Engadget - Engadget - 16/11 4:47 am

Engadget Amazon Echo and Google Home were vulnerable to Bluetooth exploit Engadget Back in September, Bluetooth-connected device owners got a little scare when security firm Armis disclosed a new hack exploit known as BlueBorne. In theory, bad actors could target smartphones , tablets and such using specific vectors in Bluetooth... Armis IoT Security Says Airborne Cyber Threats Are in Smart Home Hubs IoT Evolution World (blog)





New Android Vulnerability Tricks Users Into Recording Their Screen - XDA .. - Xda-developers - 16/11 4:30 am

XDA Developers (blog) New Android Vulnerability Tricks Users Into Recording Their Screen XDA Developers (blog) This vulnerability has currently only been patched in Android 8.0 Oreo, the report states, and because a majority of Android smartphones aren't running the latest version of Android, it remains a serious risk. Approximately 77.5% of active Android ...





Don't drop it! Shocking repair prices for the iPhone X - NBCNews.com - Nbcnews - 16/11 2:36 am

NBCNews.com Don't drop it! Shocking repair prices for the iPhone X NBCNews.com Better not drop your new iPhone X. If it's damaged, you're in for a nasty surprise: The most expensive smartphone on the market is also the most costly to repair. The cost to ... The iPhone X, with its glass front and back, has two vulnerable surfaces





As logistics industry goes digital, is new technology a Trojan Horse? - .. - Aircargoworld - 16/11 1:10 am

Air Cargo World As logistics industry goes digital, is new technology a Trojan Horse? Air Cargo World Recent revelations of hacks at the National Security Administration (NSA) underscore how sophisticated cyber-criminals have become, while also pointing to the importance of having rigorous, and well-enforced protocols. The NSA has said that one major...





IPhone X and freezing weather: Can smartphones die in the bitter cold? - .. - RGJ - 16/11 12:06 am

Reno Gazette Journal IPhone X and freezing weather: Can smartphones die in the bitter cold? Reno Gazette Journal So we asked cell-phone repair shops in Canada and Alaska this question: Can it get too cold to run smartphones ? It is the battery, battery, battery, that is most vulnerable to the elements, says Roger Gurney, owner of Arctic Tech Solutions in





Russian hackers 'targeting UK energy and telecoms sector' - Sky News - SKY - 15/11 10:01 pm

Sky News Russian hackers 'targeting UK energy and telecoms sector' Sky News The NCSC chief said there were basic things that could be done to protect against both threats, although he said nation-state attacks could be very sophisticated . Mr Martin said he couldn't "get into too much of the details of intelligence matters, but ... Russian hackers attack major UK sectors Fudzilla





Wbir.com IPhone X and freezing weather: Can smartphones die in ... - .. - Wbir - 15/11 8:14 pm

WBIR-TV wbir.com IPhone X and freezing weather: Can smartphones die in ... WBIR-TV Some of Apple's $1,000-plus iPhone X's didn't work immediately when the temperature dropped. Sounds alarming, right? Apple's promise of a software update





Ksdk.com IPhone X and freezing weather: Can smartphones die in ... - KSDK - Ksdk - 15/11 8:12 pm

KSDK ksdk.com IPhone X and freezing weather: Can smartphones die in ... KSDK Some of Apple's $1,000-plus iPhone X's didn't work immediately when the temperature dropped. Sounds alarming, right? Apple's promise of a software update





IPhone X and freezing weather: Can smartphones die in the bitter ... - USA .. - Usatoday - 15/11 8:00 pm

USA TODAY iPhone X and freezing weather: Can smartphones die in the bitter ... USA TODAY Apple is readying a fix for an iPhone X screen that is unresponsive in cold weather. But can your phone withstand the co





Many OnePlus Phones Are Vulnerable To Hacking - MensXP.com - Mensxp - 15/11 6:15 pm

MensXP.com Many OnePlus Phones Are Vulnerable To Hacking MensXP.com Smartphones without competent security measures are basically useless devices that may just cost you more than they're worth. OnePlus is gearing up to launch their latest device i.e. the 5T tomorrow however that will be rendered useless if the company... OnePlus users beware! Your phone may have a 'backdoor engineer' Deccan Chronicle UPDATED: Some OnePlus Devices Are Vulnerable To Root Backdoor Access Android Headlines What is ..





As more teens got smartphones, more started killing themselves. There .. - Sacbee - 15/11 3:36 am

Daily Mail As more teens got smartphones , more started killing themselves. There might be a link Sacramento Bee However, according to the Pew Research Center, smartphone ownership crossed the 50 percent threshold in late 2012 - right when teen depression and suicide began to increase. By 2015, 73 percent of teens had access to a .... But some vulnerable teens ... Girls glued to their phones 'more likely to suffer depression': Five hours a day in front of a screen raises risk by 71% Daily Mail





OnePlus Phones Were Shipped With a Hidden Backdoor - Motherboard - Vice - 15/11 2:31 am

Motherboard OnePlus Phones Were Shipped With a Hidden Backdoor Motherboard Mobile security researcher Robert Baptiste, who goes by the pseudonym Elliot Alderson (a nod to the main character in the Mr. Robot series), discovered that OnePlus smartphones have been apparently shipping for years with a hidden backdoor. It makes it ... Some OnePlus Devices Are Vulnerable To Root Backdoor Access Android Headlines OnePlus phones have a backdoor that can be used to gain root access AndroidOS.in (blog)





How Hacking Works - Motherboard - Vice - 15/11 1:33 am

Motherboard How Hacking Works Motherboard In popular culture, hacking is often depicted as something almost magical: Hugh Jackman frantically typing in front of a colorful screen of gibberish, or Chris Hemsworth staring into a computer with a fancy graphic user interface keylogger, waiting for ...





Smartphones a likely culprit in the recent decline in teen mental health - .. - Statnews - 15/11 1:13 am

STAT Smartphones a likely culprit in the recent decline in teen mental health STAT However, according to the Pew Research Center, smartphone ownership crossed the 50 percent threshold in late 2012 right when teen depression and suicide began to increase. By 2015, 73 percent of teens had access to a smartphone . ... But some ... Increases in Depressive Symptoms, Suicide-Related Outcomes, and Suicide Rates Among U.S. Adolescents After ... SAGE Journals




News Buzz    



I did what I could for Anwar, says Dr Mahathir - Free .. - FMT
Free Malaysia Today I did what I could for Anwar, says Dr Mahathir Free Malaysia Today mahathir-mohamad-anwar-ibrahim- malaysia -1 PETALING JAYA: Former prime minister Dr Mahathir Mohamad today claimed he did what he could for his former deputy Anwar Ibrahim. He said this during a town hall ..
News Maker    



Dr Mahathir can't get rid of me, says Malaysian PM .. - Today
TODAYonline Dr Mahathir can't get rid of me, says Malaysian PM Najib TODAYonline PUTRAJAYA Malaysian Prime Minister Najib Razak has dismissed his political nemesis, Dr Mahathir Mohamad's chance of ousting him from power in the next general election. The prime minister, while acknowledging ..
World    



'The people are free': Zimbabweans react to the fall .. - Theguardian
The Guardian 'The people are free': Zimbabweans react to the fall of Robert Mugabe The Guardian The news came at 5.30pm, as Zimbabwe's MPs and senators debated a motion to impeach their president in the conference hall of a five-star hotel in Harare. Helton Bonongwe, the minister for ..
Business    



Uber Paid Hackers to Delete Stolen Data on 57 Million .. - Bloomberg
Bloomberg Uber Paid Hackers to Delete Stolen Data on 57 Million People Bloomberg Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for more than a year. This week, the ride-hailing company ousted Joe ..
Tech    



Tough to choose between 2 good Huawei phones - The .. - Straitstimes
The Straits Times Tough to choose between 2 good Huawei phones The Straits Times Both phones in Huawei's latest Mate 10 line - the Mate 10 and the Mate 10 Pro - look and feel like different phones, even though they belong to the same family. Despite what the naming convention may have you ..
Tech Hack    



Uber Paid Hackers $100000 to Cover Up a Breach .. - Vice
Motherboard Uber Paid Hackers $100000 to Cover Up a Breach Impacting 57 Million Customers Motherboard It's also important, no matter what solution you choose, that you're practicing good digital security generally. If you want a refresher on basics like choosing a secure password , you can check out ..
Wireless Mobile    



Tracking gift cards? There's an app for that - Reno .. - RGJ
Reno Gazette Journal Tracking gift cards? There's an app for that Reno Gazette Journal More: Gift ideas: The 2017 Tech & Gadget Gift Guide Technobubble. More: Gift ideas: 8 spirits to ... To consolidate these mountains of plastic wafers, look at apps such as Gyft, which are available for both ..
Tech Watch    



Google tracked Android users even with location .. - Trustedreviews
TrustedReviews Google tracked Android users even with location services disabled TrustedReviews Google has been busted for tracking Android device owners' whereabouts, even when the location services have been disabled. A Quartz investigation found the firm had been using nearby cell towers to ..
Automotive Future    



Infiniti Teases New Model, Technology Ahead of LA Auto .. - Motor1
Motor1.com Infiniti Teases New Model, Technology Ahead of LA Auto Show Motor1.com The L.A. Auto Show is just over a week away, and Infiniti is hoping to make some waves with a new vehicle debut that it says will have world-first technologies , among other things. To add some fuel to ..
Ads