An Inkjet Printer is All You Need to Hack a Smartphone’s Fingerprint Scanner
No two fingerprints are alike. It’s an undisputable fact that’s allowed humanity to make huge strides in criminal justice, record-keeping,...
A Future Beyond Mobile Devices; Trusting the Promises of Mobile World Congress
More than 100,000 people descended upon Mobile World Congress (MWC) last week to watch experts from around the world discuss...
Does Anyone Really Care About Mobile Security?
I’ve attended Mobile World Congress a number of times and it is fair to say the concept of the show...
Android Users, Beware: 60 Games in Google Play Deemed Malicious
It’s no secret that mobile games are designed to be addictive. Unfortunately, this can be to our disadvantage. It’s all...
Attackers Seek to Hack Hardware for Ultimate Control
We are seeing interesting changes in how researchers and attackers are exploring methods to undermine systems and devices. Increasingly, the...
SMS Phishing Campaign Spreads in China
Phishing messages and fake websites for stealing users’ credentials are a common occurrence. Recently, however, mobile banking users in China...
Behind the Mobile App: Your Data Exposed
Taylor Swift dropped a musical explosion when she released her music video for the song “Bad Blood” earlier this year....
Land of the Lost Mobile Phones
Have you ever experienced that panicked moment when you realize you can’t find your mobile phone? You check your pockets,...
2016 Cybersecurity Predictions Report Examines Growth in Integrity Attacks
Cybersecurity changes rapidly. Those with valuable insights can better prepare for the shifting risks and opportunities. McAfee has just released the McAfee...
Mobile Phone Etiquette
Nothing irritates me more than someone using their phone while talking to me – and it’s not because I think...