A researcher has identified a number of issues with the security of the Tesla S, including its dependence upon a weak one-factor authentication system linked to a mobile app that can unlock the car remotely.
Browsing Category: Mobile Security
The makers of Fandango and Credit Karma have settled with the Federal Trade Commission after the commission charged that they deliberately misrepresented the security of their apps and failed to validate SSL certificates.
Several bits of malware targeting Android mobile devices hijack the smartphone or tablet’s resources to mine digital currency such as Litecoin or Dogecoin.
Politicians and policy analysts, discussing the issue in a panel Monday, said that there is room for sensible regulation without repeating the mistakes of the Crypto Wars of the 1990s.
A phone Tor browser for iOS available on the Apple App Store is reportedly a fake and serves users with spyware and adware.
A research paper reveals vulnerabilities in the Android Package Management Service update mechanism that put every Android device at risk for privilege escalation attacks.
UPDATE–The iOS platform has been remarkably resistant to malware infections over the years and attackers interested in mobile devices mainly have focused their efforts on Android. But the developer of a little-known bot that has the ability to run on Linux and Windows machines now has a version that apparently can run on iOS as[...]
Win-Spy, a commercial Windows remote administration tool, has added Android monitoring capabilities. Researchers have discovered Win-Spy used in targeted attacks against a U.S. bank.
UPDATE – Samsung is contending claims last week that several of their Galaxy branded devices have a backdoor that could give an attacker “over-the-air remote control,” access to the phone’s file system and turn them into spying tools.
The term metadata and the implications of its collection and analysis have been one of the key points in the debate surrounding the NSA’s broad surveillance programs over the last year. Legislators, policy makers and others continue to argue about whether metadata can actually reveal anything about the people behind the phone numbers, but researchers[...]