Hanging Up on Mobile in the Name of Security

Hanging Up on Mobile in the Name of Security

An entrepreneur and virtual currency investor is suing AT&T for $224 million, claiming the wireless provider was negligent when it failed to prevent thieves from hijacking his mobile account and stealing millions ...
IoT, 5G Networks and Cybersecurity – Part 1: The Rise of 5G Networks

IoT, 5G Networks and Cybersecurity – Part 1: The Rise of 5G Networks

Smartphones today have more computing power than the computers that guided the Apollo 11 moon landing. From its original positioning of luxury, mobile devices have become a necessity in numerous societies across ...
Fortnite: When Dollars and Cents Trumps Security!

Fortnite: When Dollars and Cents Trumps Security!

When Epic Games recently announced and subsequently released Fortnite for Android, it took the decision to bypass the Play Store and ask users to side-load the app. After I read that Epic ...
Smartphones Vulnerable to New Form of Attacks Via microSD Cards

Smartphones Vulnerable to New Form of Attacks Via microSD Cards

Security researchers at CheckPoint have warned about a new danger for our mobile devices, using a vulnerability that goes through the microSD cards. These forms of modified microSD cards can reportedly allow ...
Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Researchers have devised a new attack technique that takes advantage of how apps use the external storage of Android devices to store files to bypass security restrictions. Under the Android security model each ...
Security Boulevard
Dealing with Overlay Attacks: Adopting Built-in Security To Safeguard Mobile Experience

Dealing with Overlay Attacks: Adopting Built-in Security To Safeguard Mobile Experience

The growth of mobile technology and the increased importance of cybersecurity have dominated news cycles in the past year. At the same time, one of the biggest threats we’re seeing against mobile ...
Android Man-in-the-Disk Attack Can Expose Apps & User Data

Android Man-in-the-Disk Attack Can Expose Apps & User Data

Security experts discovered a new Android infection mechanism called the Man-in-the-Disk attack. It takes advantage of a design issue found to be with the operating system itself that takes advantage of the ...
Security Boulevard’s 5 Most Read Stories for the Week

Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, ...
Security Boulevard

New Google software, new smartphone flaws, and the high cost of ransomware | Avast

A slice of Pie Grabbing headlines this week was the release of Google’s Android 9 Pie software, which started rolling out on Tuesday to Google Pixel phones. Standard whiz-bang OS enhancements aside, ...
5G Networks Security Challenge

Juniper Networks Rises to 5G Networks Security Challenge

Juniper Networks this week took the wraps off an acceleration card for its firewall designed to keep pace with the volume of traffic expect to be generated by 5G networks. Amy James, ...
Security Boulevard
Loading...