#mobile-security

[ follow ]
#privacy
fromTheregister
23 hours ago

India demands smartphone makers install government app

"Spoofed/ Tampered IMEIs in telecom network leads to situation where same IMEI is working in different devices at different places simultaneously and pose challenges in action against such IMEIs," according to the announcement. "India has [a] big second-hand mobile device market. Cases have also been observed where stolen or blacklisted devices are being re-sold. It makes the purchaser abettor in crime and causes financial loss to them.
Information security
Privacy technologies
fromZDNET
1 week ago

I never use public chargers without this $15 USB-C cable - here's why it's so critical

Use power-only, data-blocking USB-C cables when charging in public to prevent juice jacking and block any data communication with unknown chargers.
#spyware
fromZDNET
1 week ago
Information security

Is spyware hiding on your phone? The telltale signs to find out (and how to remove it fast)

fromZDNET
4 weeks ago
Information security

Is spyware hiding on your phone? How to find and remove it - fast

fromZDNET
1 week ago
Information security

Is spyware hiding on your phone? The telltale signs to find out (and how to remove it fast)

fromZDNET
4 weeks ago
Information security

Is spyware hiding on your phone? How to find and remove it - fast

fromZDNET
1 week ago

I finally tried GrapheneOS on my Pixel, and it's the secure Android alternative I've been waiting for

If you've never heard of GrapheneOS, think of it as a privacy and security-focused mobile operating system that includes Android compatibility and is developed as a non-profit, open-source project. GrapheneOS, which began in 2014 as CopperheadOS, achieves its heightened security by way of sandboxing, exploit mitigations, and the Android permission model. This alternative mobile OS mitigates entire classes of vulnerabilities to make exploiting the OS exponentially more difficult.
Privacy technologies
Information security
fromThe Hacker News
1 week ago

Why IT Admins Choose Samsung for Mobile Security

Samsung Galaxy devices with Knox provide hardware-backed, multi-layered security and centralized management that enables Zero Trust access while preserving employee productivity.
London
fromwww.standard.co.uk
2 weeks ago

Alexa Chung becomes the latest celebrity targeted by phone snatchers in London

Phone theft in London remains rampant, with international smuggling networks exporting tens of thousands of stolen devices and calls for manufacturers to strengthen security.
Gadgets
fromZDNET
2 weeks ago

How I use this hidden Android security feature to easily turn off sensors - and where to enable it

Enable Android's Sensors Off Quick Settings tile to quickly disable camera, microphone, and GPS for improved privacy and security.
Information security
fromTelecompetitor
1 month ago

Human Error/Carelessness + AI = Big Trouble: Security Report

Mobile attacks and AI-powered threats are rising, driven by human error and insufficient training, while mobile device management (MDM) adoption significantly reduces severe repercussions.
#apple
fromWIRED
1 month ago
Apple

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

fromWIRED
1 month ago
Apple

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

Information security
fromZDNET
1 month ago

Hundreds of free VPNs offer 'no real privacy at all,' researchers warn - does yours?

Most free VPN apps contain serious security flaws that can expose data, enable privilege escalation, and negate user privacy protections.
Mobile UX
fromGSMArena.com
2 months ago

Many OnePlus smartphones have a major SMS vulnerability, and a fix isn't coming before mid-October

OnePlus phones running OxygenOS 12, 14, or 15 have a vulnerability (CVE-2025-10184) that lets apps access SMS/MMS without consent, risking MFA security.
Information security
fromComputerworld
2 months ago

When it comes to IT purchasing, price is not the same as cost

Transparent failure rates and platform security should influence IT purchases to reduce operational disruption and support costs and improve business resilience.
fromFuturism
2 months ago

Scammers Are Now Driving Around With Fake Cell Towers That Blast 100,000 Texts Per Hour

These cybercriminals are no longer content with just sending you the odd phishing text or two. As Wired reports, more and more of them are using so-called "SMS blasters" that basically act as a portable cell tower, tricking your phones into connecting with them as they cruise by. The scammers walk or drive around with the devices, firing out a ludicrous volume of SMS messages that contain dangerous links.
Information security
Information security
fromTechCrunch
2 months ago

Apple's latest iPhone security feature just made life more difficult for spyware makers | TechCrunch

Memory Integrity Enforcement (MIE) on iPhone 17 and iPhone Air mitigates memory corruption bugs, significantly increasing difficulty and cost for spyware and exploit developers.
#cybersecurity
fromeLearning Industry
6 months ago
Information security

Mobile Security For Employees: 6 Tips To Ensure Your Phone Is Safe

Mobile phones used for work must prioritize security to prevent data breaches.
Educating employees on mobile security is crucial for protecting company data.
fromArs Technica
7 months ago
Mobile UX

iOS and Android juice jacking defenses have been trivial to bypass for years

New ChoiceJacking attack technique allows malicious chargers to steal data from phones, exploiting flaws in previous mitigations adopted by Apple and Google.
Mobile UX
fromArs Technica
7 months ago

iOS and Android juice jacking defenses have been trivial to bypass for years

New ChoiceJacking attack technique allows malicious chargers to steal data from phones, exploiting flaws in previous mitigations adopted by Apple and Google.
fromZDNET
2 months ago

Apple's iPhone 17 has a big anti-spyware upgrade built in - here's what it can do

The answer? Memory Integrity Enforcement (MIE). Meet MIE MIE was not developed to fight against low-hanging fruit -- the kinds of opportunistic cyberattackers who develop basic malware and rely on human error, phishing, and fraud to compromise a system. Instead, the memory safety feature aims to break complex, expensive, and targeted attack chains connected with state-sponsored threat actors and top-tier spyware developers.
Apple
Mobile UX
fromWIRED
2 months ago

How eSIMs Work, and How to Switch From a Standard SIM

eSIMs enable quick setup, multiple profiles, improved security, and environmental benefits while requiring app-based registration and vigilance against scams.
#android
fromZDNET
3 months ago
Information security

Google is killing the Android phone feature that once made them popular - and there's a big reason why

fromZDNET
3 months ago
Information security

Google is killing a defining feature for Android phones soon - and there's one reason why

fromZDNET
5 months ago
Privacy technologies

Your Android phone is getting a big security upgrade for free - here's what's new

fromZDNET
3 months ago
Information security

Google is killing the Android phone feature that once made them popular - and there's a big reason why

fromZDNET
3 months ago
Information security

Google is killing a defining feature for Android phones soon - and there's one reason why

fromZDNET
5 months ago
Privacy technologies

Your Android phone is getting a big security upgrade for free - here's what's new

Mobile UX
fromZDNET
4 months ago

Google Chrome for iOS now lets you switch between personal and work accounts

Google expands Chrome account switching feature on iOS, improving separation of work and personal tasks.
#phishing
fromSecuritymagazine
4 months ago
Mobile UX

5M Public, Unsecured Wi-Fi Networks Found Exposed

Mobile threats are increasing, with phishing, app vulnerabilities, and unsecured Wi-Fi posing significant risks to corporate data.
fromSecuritymagazine
7 months ago
Information security

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
Information security
fromSecuritymagazine
7 months ago

Nearly 50% of mobile devices run outdated operating systems

Outdated mobile OSes present a significant vulnerability, exploiting nearly 50% of devices.
Mobile phishing threats are increasing, with 'mishing' and 'smishing' as key concerns.
Mobile UX
fromDevOps.com
4 months ago

INE Security Launches Enhanced eMAPT Certification - DevOps.com

eMAPT certification offers the industry's most comprehensive approach to mobile application penetration testing.
#samsung
fromZDNET
4 months ago
Privacy professionals

The biggest AI feature announced at Samsung Unpacked was also the most subtle

fromZDNET
4 months ago
Privacy professionals

The biggest AI feature announced at Samsung Unpacked was also the most subtle

fromLondon Business News | Londonlovesbusiness.com
5 months ago

How to unlock a Samsung phone without losing any data - London Business News | Londonlovesbusiness.com

Forgotten PIN, Password, or Pattern is a common cause of being locked out of Samsung devices, especially if they have not been used recently.
Mobile UX
fromThe Verge
5 months ago

AT&T now lets you lock down your account to prevent SIM swapping attacks

AT&T's new Account Lock feature protects wireless users against unauthorized account changes, including phone number transfers and SIM card changes, significantly reducing the risk of SIM swapping attacks.
Privacy technologies
#android-16
fromZDNET
5 months ago
Mobile UX

Your Android phone just got a major upgrade for free - including these Pixel models

fromZDNET
5 months ago
Mobile UX

Your Android phone just got a big upgrade for free - these Pixel models included

fromZDNET
5 months ago
Mobile UX

Your Android phone just got a major feature upgrade for free - including these Pixel models

fromZDNET
5 months ago
Mobile UX

Your Android phone just got a major upgrade for free - including these Pixel models

fromZDNET
5 months ago
Mobile UX

Your Android phone just got a big upgrade for free - these Pixel models included

Mobile UX
fromZDNET
5 months ago

Your Android phone just got a major feature upgrade for free - including these Pixel models

Android 16 features streamlined updates and enhanced security, focusing on user convenience and protection for sensitive accounts.
UK news
fromwww.independent.co.uk
5 months ago

Martin Lewis shares how to keep mobile bills down and would-be thieves at bay

The Independent champions accessible journalism on crucial issues, advocating for unfiltered reporting without paywalls.
Mobile UX
fromSecuritymagazine
5 months ago

2024 Saw Over 4 Million Mobile Social Engineering Attacks

Mobile devices are increasingly susceptible to social engineering attacks, particularly with rising phishing interactions on iOS.
Mobile UX
fromZDNET
5 months ago

Your Android phone is getting new security protections - and it's a big deal for enterprises

Google's Android Enterprise platform enhances mobile security for organizations, addressing vulnerabilities in unmanaged devices.
fromTechCrunch
5 months ago

Phone unlocking firm Cellebrite to acquire mobile testing startup Corellium for $170M | TechCrunch

Cellebrite, known for its forensic tools to unlock smartphones, is acquiring Corellium for $170 million to enhance mobile security testing capabilities.
Tech industry
fromwww.bbc.com
6 months ago

Phone theft victim loses 35,000 after device stolen

Kush Chaudary, a phone theft victim, lost over £35,000 after thieves stole his phone and quickly changed his passcode, highlighting the urgency of device security.
London startup
Digital life
fromZDNET
6 months ago

7 ways to thwart phone thieves - and avoid China's infamous 'stolen iPhone building'

Stolen smartphones often end up in Shenzhen's Huaqiangbei district, especially in the Feiyang Times building, which has a reputation for trafficking stolen devices.
Gadgets
fromZDNET
6 months ago

6 hidden Android features that make my life easier - and that you're overlooking

There are hidden Android features that can enhance the user experience, simplifying tasks and improving security.
Roam Research
fromNextgov.com
7 months ago

Chinese telcos provide backbone for US allies' mobile traffic, raising espionage concerns

Chinese telecom infrastructure poses risks to international mobile traffic security for various countries.
Over 60 mobile operators rely on Chinese networks for routing sensitive data.
[ Load more ]