Related topics: google

Mobile browsers fail researchers' safety test

(Phys.org)—How unsafe are mobile browsers? Unsafe enough that even cyber-security experts are unable to detect when their smartphone browsers have landed on potentially dangerous websites, according to a recent Georgia ...

Georgia Tech releases cyber threats forecast for 2013

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global ...

Apple ordered to pay $368 million in patent case

Apple has been ordered to pay $368 million for patent infringement in its use of Facetime, an application that allows for video calls on mobile devices, the plaintiff said Wednesday.

Researchers ID 'smishing' vulnerability in Android

(Phys.org)—Mobile security researchers have identified a new vulnerability in popular Android platforms, including Gingerbread, Ice Cream Sandwich and Jelly Bean. The vulnerability has been confirmed by Google, and will ...

NIST provides draft guidelines to secure mobile devices

The National Institute of Standards and Technology (NIST) has published draft guidelines that outline the baseline security technologies mobile devices should include to protect the information they handle. Smart phones, ...

Android apps are full of potential leaks, finds study

(Phys.org)—Many Android apps are capable of falling victim to Man in the Middle (MITM) attacks. How many? Far too many. Thousands of apps in the Google Play mobile market present vulnerabilities because of the way that ...

3G protocols come up short in privacy, say researchers

(Phys.org)—Researchers from the UK and Germany have found that 3G telephony systems pose a security weakness that results in threats to user privacy. The weakness makes it possible for stalkers to trace and identify subscribers. ...

page 11 from 18