The security team at Avast used their data-recovery tools on 20 phones found on eBay. What they find was rather shocking. (more…)
An iPhone robbery turned deadly when a girl died after sustaining injures trying to save her phone. The teenager, Rubi Rubio, was only 15. She was walking with her 7-year-old sister when a stranger approached the girls and asked for the time. He then took the phone away from Rubio by force. (more…)
Wading through airport security can be treacherous for travelers as it often means hours in line with the possibility of missed flights. What if we could skip all of that just by having our Wi-Fi devices tracked?
The technology being used from Blip Systems has already been installed at airports in Amsterdam, Dubai, Geneva, Oslo, and Toronto. Now, it’s coming to Cincinnati’s airport – a declining transportation hub that’s seen a drop from 2008’s 13.6 million passengers to just 5.7 million passengers in 2013. (more…)
Fake apps are getting the boot from Google Play and Amazon’s app store, but not before they are quickly used by the Android community. This time, five apps were removed after FireEye discovered that they were nothing but placebos.
The security researchers, Jinjian Zhai, Jimmy Su and Humayun Ajmal, said some of the apps were actually paid versions outside of the US whereas US consumers could theoretically download a free version and then pay for non-existent in-app services. (more…)
In a victorious decision for the ACLU, a Florida Judge has forced the state police to release documents describing its use of stingray cell phone trackers.
The emergency motion and subsequent decision came as a result of a court case in Tallahassee, Florida where police testified using stingray technology to track a cell phone inside a suspect’s apartment without obtaining the necessary warrant. The ACLU then tried to obtain court papers but were thwarted by federal marshals seeking to keep public papers accessible to the public, as required by law. (more…)
Stolen iPhones and iOS products are at the mercy of hackers, who can unlock “bricked” devices using a new workaround for iCloud’s Activation Lock. The new tool, doulCi from Dutch hacker AquaXetine and Moroccan hacker MerrukTechnolog allows anyone to plug a phone into a computer in order to access the hacker’s server to unlock the device. (more…)
Your smartphone camera’s unique noisy pixelations might be the key to smartphone security, especially if you’re seeking to hide your data from the eyes of the NSA, who can decode practically all versions of security cryptography.
Since computing technology has a hard time finding reliable, random chaos, a smartphone camera can be the perfect solution since it’s a simple, fast source for chaos in the form of a light reader. It’s quantum physics, but for mobile users. (more…)
Minnesota’s governor Mark Dayton just signed the first law requiring smartphones to be sold with pre-installed antitheft software, now commonly referred to as a kill switch. The new Minnesota law will be effective on July 1, 2015.
The legislation, however, does not clearly define a ‘kill switch’ in that it doesn’t mandate stolen phones must be rendered inoperable once stolen. Moreover, the bill itself also allows for phone manufacturers to sell phones without antitheft software so long as consumers can download it for free: (more…)
With the words “mobile security” sounding more and more like an oxymoron these days, not to mention, grabbing headlines around the world, secure-file sharing mobile app Lockbox boasts a solution the company guarantees can’t be broken by the NSA, or even the people at Lockbox themselves. (more…)
Social Media Jobs
of the Day
University of California at Irvine
New York, NY
New York, NY
New York, NY