The BEAST attack on some TLS implementations made major news when it was disclosed, showing that attackers could intercept and decrypt SSL-protected sessions in real time, breaking a significant portion of the confidentiality model of the protocol. Vendors rushed to patch and implement mitigations. That was in 2011. Nearly three years later, Siemens is pushing[...]
Browsing Category: Mobile Security
A researcher has identified a number of issues with the security of the Tesla S, including its dependence upon a weak one-factor authentication system linked to a mobile app that can unlock the car remotely.
The makers of Fandango and Credit Karma have settled with the Federal Trade Commission after the commission charged that they deliberately misrepresented the security of their apps and failed to validate SSL certificates.
Several bits of malware targeting Android mobile devices hijack the smartphone or tablet’s resources to mine digital currency such as Litecoin or Dogecoin.
Politicians and policy analysts, discussing the issue in a panel Monday, said that there is room for sensible regulation without repeating the mistakes of the Crypto Wars of the 1990s.
A phone Tor browser for iOS available on the Apple App Store is reportedly a fake and serves users with spyware and adware.
A research paper reveals vulnerabilities in the Android Package Management Service update mechanism that put every Android device at risk for privilege escalation attacks.
UPDATE–The iOS platform has been remarkably resistant to malware infections over the years and attackers interested in mobile devices mainly have focused their efforts on Android. But the developer of a little-known bot that has the ability to run on Linux and Windows machines now has a version that apparently can run on iOS as[...]
Win-Spy, a commercial Windows remote administration tool, has added Android monitoring capabilities. Researchers have discovered Win-Spy used in targeted attacks against a U.S. bank.
UPDATE – Samsung is contending claims last week that several of their Galaxy branded devices have a backdoor that could give an attacker “over-the-air remote control,” access to the phone’s file system and turn them into spying tools.