mobile - News, Features, and Slideshows

News

  • Android Devices Exposed: 7 Ways to Thwart Hackers

    Take a deep breath. There's a new report out highlighting a <a href="http://bits.blogs.nytimes.com/2011/08/25/android-number-one-target-by-mobile-hackers-report-says/?nl=technology&amp;emc=cta4">huge spike in threats against Google's Android platform</a>. Yes, it's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab.

    Bill Snyder | 31 Aug | Read more

  • iPhone thief accidentally IDs himself via Photobucket

    Photobucket has a cool mobile application that allows users to automatically upload mobile pictures to the company's photo-sharing website. That's something that Korey Heess is unlikely to forget anytime soon, after allegedly snapping a picture of himself that was used by police to identify him as a smartphone thief.

    Robert McMillan | 24 Aug | Read more

  • Jailbreaking 101:Tools for Hacking Your iDevice

    So you’re thinking of jailbreaking your iOS device are you? The process of hacking your iDevice is simpler than ever but with so many different hardware, firmware, and software combinations out there, choosing the right jailbreak tool for your configuration for you can be a bit daunting if it’s your first time. Here’s a guide to picking the right tool for you.

    Mike Keller | 24 Aug | Read more

  • AT&T Unveils New Mobile Security Strategy

    The rise of smartphones and tablets brings unprecedented mobility, but with the convenience of being able to carry and access information from virtually anywhere comes <a href="http://www.pcworld.com/businesscenter/article/237839/mobile_apps_fail_big_time_at_security_study_says.html">an increased threat</a> that attackers can also steal or access your information from virtually anywhere. AT&amp;T announced today that it is taking proactive steps to strengthen mobile security by <a href="http://www.att.com/gen/press-room?pid=20619&amp;cdvn=news&amp;newsarticleid=32381&amp;mapcode=enterprise|mk-enterprise-security">investing in a new mobile security platform</a>.

    Tony Bradley | 12 Aug | Read more

  • 10-Year-Old Outs Security Flaw in iOS and Android Games

    A 10-year-old California hacker just figured out what a bunch of developers apparently couldn't: How to hack various mobile phone and tablet based games by simply fiddling with the clock. And she just told all at the first annual <a href="http://www.defconkids.org/">DefCon Kids</a> hacker conference—a subset of <a href="http://www.defcon.org/html/defcon-19/dc-19-index.html">DEFCON</a>, the self-identified "world's longest running and largest underground hacking conference"—which wrapped yesterday in Las Vegas.

    Matt Peckham | 08 Aug | Read more

  • Mobile device security: Questions to ask for creating policy

    While 69 percent of organizations have employees <a href="http://www.csoonline.com/article/681822/just-say-yes-why-banning-consumer-devices-makes-your-organization-less-secure">using personal devices to connect to their corporate network</a>, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network. These new figures, released recently from security-products firm <a href="http://www.csoonline.com/article/684895/password-management-systems-how-to-compare-and-use-them">Courion</a>, suggest many security leaders are still ignoring the need to address mobile-device management among their employees.

    Joan Goodchild | 04 Aug | Read more

  • Mobile malware reality check

    Malicious software is leaping from PCs to cell phones, as malware makers target the platform in hopes of making a quick buck. Examples include the infected Droid­Dream and Plankton Android apps. An infected app released into the Android Market can infect several thousand users’ phones before anyone discovers the presence of the malware. Though the extent of Android malware has been overstated, it's best to learn now how to protect yourself and your data from attacks, instead of waiting until mobile malware becomes a more serious problem.

    Armando Rodriguez | 30 Jul | Read more

  • Social engineering: 3 mobile malware techniques

    Social engineers have been using various <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">dirty tricks</a> to fool people for centuries. <a href="http://www.csoonline.com/article/596512/social-engineering-techniques-4-ways-criminal-outsiders-get-inside">Social engineering</a>, the art of <a href="http://www.csoonline.com/article/494464/social-engineering-5-security-holes-at-the-office-includes-video-">gaining access to buildings</a>, systems or data by exploiting <a href="http://www.csoonline.com/article/663329/social-engineering-3-examples-of-human-hacking">human psychology</a>, rather than by breaking in or using technical hacking techniques, is as old as crime itself and has been used in many ways for decades.

    Joan Goodchild | 26 Jul | Read more

  • iPad App reads passwords, exposes flaws in protection

    When typing in your sensitive information into a website, you know that pretty much every site always mask passwords. One reason for this is to stop people from snooping over your shoulder and stealing your logins. However, a security researcher has figured out a way of seeing past password masks.

    Elizabeth Fish | 16 Jul | Read more

  • iOS 4.3.4 Is Out; Fixes JailbreakMe 3.0 Exploit

    Fire up iTunes and grab the latest iOS update--unless you jailbroke your iPhone, iPad, or iPod Touch, that is. Apple released the iOS 4.3.4 update, which fixes a lovely PDF rendering bug that could allow someone with nefarious intents to take control of your iPhone. This particular flaw is also what <a href="http://www.pcworld.com/article/235144/jailbreakme_30_how_does_it_work.html">allowed for Jailbreak.me 3.0</a>, which finally brought a jailbreak to the iPad 2.

    Nick Mediati | 16 Jul | Read more