Please turn on your JavaScript for this page to function normally.
Silent Circle launches Blackphone 2, delivering business and personal privacy

Silent Circle has launched Blackphone 2 – its next-generation smartphone that delivers privacy and security. It provides full device encryption by default through harnessing …

Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims

A vulnerability in the Swift keyboard, which comes pre-installed on Samsung mobile devices, can be exploited by remote attackers to secretly install malicious apps, access the …

Researchers track Android users by collecting accelerator readings

A group of researchers from Nanjing University, China, have demonstrated that Android users’ movements can be tracked by simply analyzing the data provided by the …

Sniffing and tracking wearable tech and smartphones

Researchers at Context Information Security have demonstrated how easy it is to monitor and record Bluetooth Low Energy signals transmitted by many mobile phones, wearable …

Yahoo develops cheap, effective biometric smartphone authentication

A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully …

Critical BlackPhone bug allows attackers to spy on users

BlackPhone, a mobile phone aimed at users who want to keep their communications secure from mass surveillance attempts, is affected by a critical security vulnerability that …

One-click mobile fraud variant throws browser for a loop

Symantec researchers have recently encountered a new variant of the old one-click mobile fraud, which results in the users’ mobile browser being thrown in a loop and …

Blackphone security issues and vulnerabilities unveiled

Blackphone, the carrier- and vendor-independent smartphone that was created with the goal of placing privacy and control directly in the hands of its users, is not without its …

9 ways to protect data on your smartphone

Recent headlines of Hollywood celebrities’ nude photos leaking onto the Internet remind us of the privacy risks we face when we store personal data – particularly …

California phone kill-switch law could lead to abuse

On Monday, California Governor Jerry Brown signed into law a bill (SB 962) that will require any smartphone sold in the state after July 1, 2015, to include a software or …

Sneak attack through smartphone shared memory

A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of …

Blackphone rooted at DEF CON?

Blackphone, the recently released security-oriented smartphone, has apparently been rooted. The feat was executed at the DEF CON hacker conference, where Jon Sawyer …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools