Many smartphones manufactured by LG contain a vulnerability that can allow an attacker to replace an APK file with a malicious file of his choice. The problem is the result of several conditions on LG phones. Like other manufacturers, LG includes custom apps on its handsets, which are not available through the normal Google Play[…]
Browsing Category: Mobile Security
Amazon patched three vulnerabilities in its Fire Phone, two of which allow for silent certificate installations.
Google’s decision to limit its Android Security Rewards program to Nexus devices could have security consequences for non-Nexus device users.
Attackers sitting on a network can intercept Swift keyboard updates from Samsung, inject code, and potentially take remote control of millions of Android mobile devices.
Google today launched the Android Security Rewards program, a bug bounty for Android Nexus 6 and Nexus 9 devices.
In the forthcoming iOS 9.0 release, Apple is adding two-factor authentication and a number of other security features.
Apple is encouraging developers who create apps for iOS to begin moving their apps to an HTTPS-only model as soon as possible in an effort to thwart eavesdropping on insecure, plaintext HTTP connections. The move is yet one more sign that major Internet and technology companies are becoming ever more resistant to large-scale, passive surveillance[…]
Today at Google I/O, the company announced a new system for Android that it hopes will urge developers to seek fewer excessive permissions for mobile applications.
What happens when you build a watch that is essentially an absurdly powerful computer that also tells time? You have to patch that watch. And that’s what Apple has done for the first time, releasing a long list of fixes for security problems with the Apple Watch OS. At least one of the vulnerabilities can[…]