Samsung Retina Scan

Mobile devices are increasingly becoming personal and ubiquitous — which means you’re probably carrying more personal information on your smartphone than your wallet. This comes... with a host of security issues, of course. If you lose your smartphone or tablet, then whoever picks it up might be able to glean a lot of information about you, to the extent that your device can be...

internet of things ARM 2014 small feature

ARM may be well known for spearheading processor development for our favourite mobile devices, but the company also offers a wide range of processors for many other applications.... Wearables look set to be the next big range of smart devices, but increasingly we’re seeing other pieces of technology make use of microprocessors and wireless communication technologies.

While the...

AT&T Restricted

AT&T is now confirming that a data breach occured between April 9 and April 21. AT&T will not confirm how many customers were affected but did say that those who were received emails alerting them. The breach involved a third-party contractor who ‘violated security protocols and accessed customer data.”

NSA Spying Logo

ConsciousLifeNews

It’s an open secret that the NSA is keeping tabs on Internet users through various means. Whistleblower Edward Snowden’s revelations suggest that the agency does... not even have to take an active role in eavesdropping, as it’s the Internet and tech companies that do this for them. Case in point: Vodafone¬†recently published a¬†transparency report, indicating...

Android Malware Download

Using the logo of the FBI and President Barack Obama, Android-Trojan.Koler.A uses a location function to tailor the warnings to whatever country that you reside in. The malware prevents users from accessing the home screen of their phones, making it impossible to use most other apps installed on the phone.

In some cases, a phone can be restored only when you pay a so-called “fine” of about $300, using payment services such as Paysafecard or uKash that are incredibly difficult to trace. Thankfully, there is no evidence that the malware encrypts any files on a phone’s storage.