Smartphones

Is Android security really too difficult for Motorola?

Is Android security really too difficult for Motorola?

By

Motorola has, perhaps strangely, concluded that it will not be releasing monthly updates for its new Moto Z smartphone. A strange thing to announce, according to the wider industry

New smartphone case tells users when their phone is being hacked

By

NSA Whistleblower Edward Snowden and hacker Andrew Huang have co-designed a smartphone case that tells its owner when their phone is being hacked.

Viking Horde: are mobile botnets a thing now?

Viking Horde: are mobile botnets a thing now?

By

As mobile devices become ever more powerful, they are increasingly being targeted by botnet operators as the ideal members of their zombie armies.

Video: Now the corporates are also threat actors, says Mikko Hypponen

Video: Now the corporates are also threat actors, says Mikko Hypponen

By

Following Mikko Hypponen's presentation at IP Expo Europe, entitled "Securing Our Future", he elaborated on the theme of threat actors - both corporate and otherwise - in a video interview with SCMagazineUK.com.

Snowden smartphone allegations - security world unimpressed

Snowden smartphone allegations - security world unimpressed

By

Edward Snowden's appearance on last night's Panorama, and his phone hack allegations fail to shock security experts.

Fingerprints only ever part of the solution, whether Android or Apple

Fingerprints only ever part of the solution, whether Android or Apple

By

SCMagazineUK.com investigates the real value of biometric IDs, particularly fingerprints, on smartphones.

How overcoming security challenges improved customer experience

How overcoming security challenges improved customer experience

In the age of connected objects, social networks, smartphones and new consumer behaviours, the IT security department has an increasingly important role for enterprises across all sectors, says Thierry Bettini.

Samsung keyboard vulnerability exposes triple whammy mobile flaw

Samsung keyboard vulnerability exposes triple whammy mobile flaw

Researchers at NowSecure have uncovered a vulnerability in the stock keyboard that is pre-installed on 600 million Samsung devices, including the new Galaxy S6, that can apparently enable a remote arbitrary code execution attack.

Leaky Bluetooth smartphones & wearables can be tracked from 100m away

Leaky Bluetooth smartphones & wearables can be tracked from 100m away

By

Researchers at Context Information Security have discovered that smartphones, tablets, iBeacons, fitness trackers and other wearable devices using embedded Bluetooth Low Energy (BLE) could potentially be tracked from 100m away.

Fujitsu adds iris scanning to smartphone biometrics

Fujitsu adds iris scanning to smartphone biometrics

Smartphone users could be offered a new way to protect their devices. Fujitsu is set to introduce iris-scanning technology for phones as an alternative security measure.

New security concerns on air-gapped laptops and smartphones

New security concerns on air-gapped laptops and smartphones

By

Security researchers believe that hackers could intercept and read the low-power electronic signals emitted by laptops and smartphones - even if they're not connected to the internet.

87% of top Apple iOS apps have been cracked

87% of top Apple iOS apps have been cracked

By

Attacks on Apple iOS devices are rising sharply, with 87 percent of the top 100 paid-for iOS apps now having been cracked and cloned - up from just 53 percent in 2013, according to a new report.

Mobile flaw means 92% of Gmail accounts are hackable

Mobile flaw means 92% of Gmail accounts are hackable

By

Researchers with the University of California's College of Engineering and the University of Michigan have identified a weakness they believe exists across Android, Windows and iOS operating systems that could allow malicious apps to obtain personal information.

CISOs offered new way to secure Android devices

CISOs offered new way to secure Android devices

By

US and German researchers have come up with a novel way to secure the notoriously flaw-ridden Android - a framework that allows corporate and other users to rapidly add security enhancements to Android devices without having to touch the firmware or operating system itself.

Industry divided as Met Police recommends smartphone PINs

Industry divided as Met Police recommends smartphone PINs

By

After two years of quietly lobbying mobile phone manufacturers such as Apple and Samsung, the Metropolitan Police have gone public with its request for all mobile phone vendors to implement PIN protection as a default setting on a handset.

The 5 most read articles this week: July 4-11

The 5 most read articles this week: July 4-11

By

Here are the five most popular articles, as read by you the reader, in the week for July 4 to 11.

New surveillance law proposed to track mobiles

New surveillance law proposed to track mobiles

By

The three main political parties in the UK are in talks about introducing a new emergency law that would require phone companies to log records of phone calls, texts and internet usage.

Is your smartphone really switched off?

Is your smartphone really switched off?

By

"Anyone with an understanding of embedded systems could develop the technology to hibernate, rather than switch off, the handset" - Rob Bamforth, Quocirca

Mobile guidance on encryption/VPN from CESG

Mobile guidance on encryption/VPN from CESG

By

The CESG, the security offshoot of GCHQ, has published in-depth guidance for users of laptop, tablet and smartphone operating systems, offering specifics on how to deploy and use the operating systems on a mobile platform.

Phone 'tilt' sensors can be used to track you

Phone 'tilt' sensors can be used to track you

By

A team of US researchers has revealed that attackers can use smartphone and tablet 'tilt' and 'swipe' motion sensors - which cannot be blocked - to secretly track users.

Android phone makers accused of ignoring security

Android phone makers accused of ignoring security

By

MWR researchers hack the "best" new Android devices and say: "there will be a lot of issues like this."

Android 5.0 to support business features?

Android 5.0 to support business features?

By

Widely reported changes to the next version of Google's Android are starting to make the operation system "look like a professional platform", say analysts.

Flying drone steals smartphone contents

Flying drone steals smartphone contents

By

British researchers have tested their invention, the Snoopy drone, over the skies of London.

SC Congress London: BYOD issues remain in post-Blackberry era

SC Congress London: BYOD issues remain in post-Blackberry era

By

Bring Your Own Device is making waves in business, but concerns remain on how employees use personal smartphones and tablets, how they're managed and the laws to which companies must adhere.

Secure Android smartphone could be targeted by hackers and NSA

Secure Android smartphone could be targeted by hackers and NSA

By

The new "Blackphone" smartphone may have only debuted at last week's Mobile World Congress but concerns are already being raised that it will be targeted by hackers and the NSA.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US