Four major credit card companies are working with the Isis mobile wallet venture to install mobile payment security applications on upcoming NFC-ready smartphones in the U.S.
Matt Hamblen |
26 Aug |
Read more
This past week in security news was highlighted by a hacking revelation out of China, bad news for banks, good news for Sony gaming customers and a curious email that might have been at the heart of the big RSA data breach.
Ellen Messmer |
27 Aug |
Read more
Researchers have publicised probably the most dangerous Android malware examples yet discovered, a Trojan that exploits the GingerBreak root hack (<a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-1823">CVE-2011-1823</a>) in Android 2.3 that gained wide publicity after its discovery in April.
John E Dunn |
24 Aug |
Read more
Ponemon Institute asked 745 information-technology and security managers whether USB drives were important for business use, and if they were secure. What did the survey find?
Ellen Messmer |
24 Aug |
Read more
Photobucket has a cool mobile application that allows users to automatically upload mobile pictures to the company's photo-sharing website. That's something that Korey Heess is unlikely to forget anytime soon, after allegedly snapping a picture of himself that was used by police to identify him as a smartphone thief.
Robert McMillan |
24 Aug |
Read more
Researchers have spotted the first malware that exploits a critical vulnerability in Android 2.3, aka Gingerbread, finding samples tucked into legitimate apps on Chinese download sites.
Gregg Keizer |
24 Aug |
Read more
Attacks on Android by malware writers have jumped 76 percent over the last three months, making it the most assaulted mobile operating system on earth during the period, according to a report by cybersecurity solutions maker McAfee.
John P. Mello Jr. |
24 Aug |
Read more
So you’re thinking of jailbreaking your iOS device are you? The process of hacking your iDevice is simpler than ever but with so many different hardware, firmware, and software combinations out there, choosing the right jailbreak tool for your configuration for you can be a bit daunting if it’s your first time. Here’s a guide to picking the right tool for you.
Mike Keller |
24 Aug |
Read more
McAfee's talking-up of the threats represented by Operation Shady RAT supports a convenient narrative, but how much do we accurately know about the unidentified enemy or enemies? Not a lot, I'd wager.
Stilgherrian |
24 Aug |
Read more
It shouldn't come as a shock that iOS 5 beta 6 has succumbed to jailbreaking. But unlike the usual speedy jailbreak action we're used to seeing (i.e. jailbreaks discovered within 24 hours), this one took nearly three days to figure out, which is a pretty slow turnaround for the hacking community. Either way, the tools required to unlock iOS 5 beta 6 are now here.
Chris Brandrick |
23 Aug |
Read more
Fujitsu has released a new tablet and mobile security browser aimed at scrubbing the oft-lost devices of valuable data.
Liam Tung |
19 Aug |
Read more
The flap over iPhone location tracking led to some grandstanding <a href="http://www.pcworld.com/article/230391/senators_propose_mobile_location_privacy_law.html">in Congress</a> and a <a href="http://www.pcworld.com/article/227727/apple_sued_again_over_ios_location_and_data_sharing.html">few lawsuits</a> by users in the United States over privacy concerns, but now nearly 27,000 South Koreans are suing Apple for privacy violations.
Eric Mack |
18 Aug |
Read more
Hoping to spark some entrepreneurial creativity in the Big Apple, online tools provider Aviary has organized a New York City event for developers to hack together new photo-based applications.
Joab Jackson |
18 Aug |
Read more
Besides humans that don't change default passwords, the lowest hanging fruit are embedded Linux devices in routers.
Liam Tung |
17 Aug |
Read more
Google's US$12.5 billion purchase of Motorola Mobility is being reported primarily in terms of access to patents and difficulty integrating the corporate cultures. But there's also a potential longer-term spin-off. Secure Android smartphones.
Stilgherrian |
16 Aug |
Read more
Worried by the <a href="http://blogs.computerworld.com/18746/android_malware">spate of news stories</a> about <a href="http://www.computerworld.com/s/article/9218831/Spike_in_mobile_malware_doubles_Android_users_chances_of_infection">malware targeting Android phones and tablets</a>? There's a way to get some peace of mind: Symantec's just-released Norton Mobile Security, which promises the same type of <a href="http://www.computerworld.com/s/topic/17/Security">security</a> for <a href="http://www.computerworld.com/s/article/9178688/Android_news_reviews_more">Android</a> devices that its big brother counterpart offers for PCs. (The app was previously available as a beta.)
Preston Gralla |
16 Aug |
Read more
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.
Eric Geier |
15 Aug |
Read more
A lot of the software written for Google's Android mobile phones falls short when it comes to user privacy and security.
Robert McMillan |
13 Aug |
Read more
The QNX operating system that will power future BlackBerry devices has been given a cagey thumbs up by penetration testers commissioned to probe for weaknesses in its design.
John E Dunn |
13 Aug |
Read more
The rise of smartphones and tablets brings unprecedented mobility, but with the convenience of being able to carry and access information from virtually anywhere comes <a href="http://www.pcworld.com/businesscenter/article/237839/mobile_apps_fail_big_time_at_security_study_says.html">an increased threat</a> that attackers can also steal or access your information from virtually anywhere. AT&T announced today that it is taking proactive steps to strengthen mobile security by <a href="http://www.att.com/gen/press-room?pid=20619&cdvn=news&newsarticleid=32381&mapcode=enterprise|mk-enterprise-security">investing in a new mobile security platform</a>.
Tony Bradley |
12 Aug |
Read more