Samsung is said to be working on delivering a kill switch feature for smartphones as soon as July. Would you feel safer knowing that such an anti-theft feature exists?
A new security report continues trend by antimalware companies of releasing scary numbers, but once you dig through the hype there are some real figures which should at least make every Android user aware of the dangers of downloading apps from third parties.
The problem is that Google Glass hears and sees everything you do. In a worse case scenario a hacked version of Google Glass can store and transmit everything you see and hear to a malicious third party.
Samsung is gearing up for the worldwide release of the Galaxy S4, but the security software solution Knox won’t be ready for launch.
What happens when two of the biggest names in world of privacy come together to break bread and discuss just what exactly makes the world go round? You’d like to be a fly on the wall in that room, wouldn’t you? Luckily the beans have been spilled on the extraordinary meeting between Wikileaks’ founder Julian Assange and Executive Chairman of Google, Eric Schmidt. Read on!
Google Chrome security has been improved, as stronger measures have been taken to protect users against installing malicious extensions.
A professor of computer science from the University of California, Davis has been doing research into security vulnerabilities in Android apps and has discovered that some apps are exposing interfaces which could be used for malicious purposes.
New research from security specialists Bitdefender suggests that as many as one third of free Android apps access and upload your private data (including your phone number) to third parties.
Samsung Knox security features are set to include Absolute persistence technology, as a result of a recent partnership between the two companies.
Some of the biggest names in American telecommunications, including AT&T, Sprint, Verizon, Comcast and Microsoft, have released an inconclusive report about how the US government should enforce (by law if necessary) cyber security controls in the communications sector. The working group, which was set up to advise the Federal Communications Commission (FCC), reported that there was no consensus within the committee regarding the extent to which the government should “encourage” the communications industry to use the so-called “20 Controls.” The 20 controls is a list of practices that all infrastructure and utility companies (including electricity, water and telecommunications) should implement to protect the USA against cyber attack. The…