smart phones

Heartbleed Still a Threat to Hundreds of Thousands of Servers

A month after the Heartbleed OpenSSL security vulnerability was first publicly disclosed, there are strong indications that there are still a whole lot of vulnerable users.

The anatomy of an Android smartphone cyberattack

You might think buying a new phone from your mobile service provider means the latest model comes with updated software, guarding against potential cyberattacks. Well, you'd be wrong.  Android phones are the most popular smartphones in the world, with more than 78 percent market share, according IDC's Worldwide Quarterly Mobile Phone Tracker.

Smartphones Gain Traction as a Health IT Solution, Despite Concerns

Mobile devices such as smartphones and tablets are increasingly used by nurses in hospital settings, despite security and privacy concerns.

Apple, Samsung, others urged to help thwart mobile phone thefts

The attorney general pointed to a rise in the theft of phones and other mobile devices in a practice known as "Apple picking." Criminals steal the phones, wipe them clean, and then resell them on the black market. Sometimes the thefts turn violent; Schneiderman cited just a few examples in which cell phone owners were mugged, stabbed, or even killed.

iPhone has most vulnerabilities, so why is Android the most attacked?

Android’s market share and the openness of the operating system have made it the “go-to platform of malware authors,” according to Symantec research. Although the Apple iOS accounted for 93 percent of reported mobile vulnerabilities in 2012, Android accounted for 97 percent of threats. 

Officials warn students of laptop theft

“For some reason being around students at the library, I assume people would be civil and such,” he said. “It makes you remember that Alexander is not a student-only library, but a public one and anyone can come in and out.” But RUPD made Alexander Library a priority in terms of patrol, Cop said. Public safety personnel were also assigned to distribute informational materials about the consequences of leaving property unattended. At least 15 laptops were stolen from University libraries last semester, said Jeff Teichmann, a library supervisor at Alexander Library, where most of the thefts took place. Cop said most thefts occurred when items were left unattended.

2013 Mobile Security, Payments Outlook

For the nascent mobile payments marketplace to expand as projected, Javelin contends, financial institutions, merchants, device manufacturers and mobile wallet service providers must work together with mobile users to ensure a more secure user experience.

Senate legislation targets cyberstalking software

The Senate Judiciary Committee was expected Thursday to approve legislation that would close a legal loophole that allows so-called cyberstalking apps to operate secretly on a cellphone and transmit the user's location information without a person's knowledge.

Mobile users get no clue they're visiting malicious sites

Mobile browsers can use security features such as Secure Sockets Layer and Transport Layer Security. But you might not know if these features are in operation because the lock logo or HTTPS we see in the URL window of a desktop browser might not be there on your smart phone. “The drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use and consistency of the security indicators and certificate information that alert users of site identity and the presence of strong cryptographic algorithms,” according to a Georgia Tech-led team of researchers.

Smart Phone Malware Risk Rises

Mobile malware is exploding at a time when financial institutions are increasing their mobile banking offerings and consumers are making broader use of smart phones and tablets. A recent study from software and security firm Trend Micro finds that mobile malware attacks hit record numbers in the third quarter, with Android devices as the primary targets.

Syndicate content