5.3 billion devices at risk for invisible, infectious Bluetooth attack

Tuesday, September 12th, 2017

What spreads through the air, is invisible to users, and requires no user interaction— no clicking, no pairing, no downloading, not even turning on discoverable mode— but could bring the hurt to billions of devices? It’s an attack vector dubbed Blueborne. Researchers revealed eight different bugs that affect the Bluetooth ...

New attack steals secret crypto keys from Android and iOS phones

Saturday, March 5th, 2016

Researchers have devised an attack on Android and iOS devices that successfully steals cryptographic keys used to protect Bitcoin wallets, Apple Pay accounts, and other high-value assets. The exploit is what cryptographers call a non-invasive side-channel attack. It works against the Elliptic Curve Digital Signature Algorithm, a crypto system that's widely ...

New type of auto-rooting Android adware is nearly impossible to remove

Wednesday, November 4th, 2015

Researchers have uncovered a new type of Android adware that's virtually impossible to uninstall, exposes phones to potentially dangerous root exploits, and masquerades as one of thousands of different apps from providers such as Twitter, Facebook, and even Okta, a two-factor authentication service. The researchers have found more than 20,000 samples ...

Signal, the Snowden-Approved Crypto App, Comes to Android

Monday, November 2nd, 2015

Since it first appeared in Apple’s App Store last year, the free encrypted calling and texting app Signal has become the darling of the privacy community, recommended—and apparently used daily—by no less than Edward Snowden himself. Now its creator is bringing that same form of ultra-simple smartphone encryption to Android. On ...

Major Flaw In Android Phones Would Let Hackers In With Just A Text

Monday, July 27th, 2015

Android is the most popular mobile operating system on Earth: About 80 percent of smartphones run on it. And, according to mobile security experts at the firm Zimperium, there's a gaping hole in the software — one that would let hackers break into someone's phone and take over, just by ...

Page 1 of 812345...Last »