Samsung Retina Scan

Mobile devices are increasingly becoming personal and ubiquitous — which means you’re probably carrying more personal information on your smartphone than your wallet. This comes with a host of security issues, of course. If you lose your smartphone or tablet, then whoever picks it up might be able to glean a lot of information about you, to the extent that your device can be a potential threat to the security of your identity. You lock your phone anyway, you say? But a Consumer Reports survey done earlier this year indicates that only a third of Americans bother to lock their…

internet of things ARM 2014 small feature

ARM may be well known for spearheading processor development for our favourite mobile devices, but the company also offers a wide range of processors for many other applications. Wearables look set to be the next big range of smart devices, but increasingly we’re seeing other pieces of technology make use of microprocessors and wireless communication technologies. While the fully connected world of the Internet of Things (IoT) is still a way away, an increasing number of devices are being built which can communicate with each other, either via wireless connections, like Bluetooth, or through the World Wide Web. IoT, a market set…

AT&T Restricted

AT&T is now confirming that a data breach occured between April 9 and April 21. AT&T will not confirm how many customers were affected but did say that those who were received emails alerting them. The breach involved a third-party contractor who ‘violated security protocols and accessed customer data.”

NSA Spying Logo

ConsciousLifeNews It’s an open secret that the NSA is keeping tabs on Internet users through various means. Whistleblower Edward Snowden’s revelations suggest that the agency does not even have to take an active role in eavesdropping, as it’s the Internet and tech companies that do this for them. Case in point: Vodafone recently published a transparency report, indicating the means and methods through which governments are spying through telecom networks. Google is actually one of the companies that have been used by spy agencies in their data mining efforts. In particular, the movement of information between datacenters can be the chink in…

Android Malware Download

Using the logo of the FBI and President Barack Obama, Android-Trojan.Koler.A uses a location function to tailor the warnings to whatever country that you reside in. The malware prevents users from accessing the home screen of their phones, making it impossible to use most other apps installed on the phone.

In some cases, a phone can be restored only when you pay a so-called “fine” of about $300, using payment services such as Paysafecard or uKash that are incredibly difficult to trace. Thankfully, there is no evidence that the malware encrypts any files on a phone’s storage.