Related topics: google

App security testing tool

"Please contact the administrator." This error message usually flashes up on the monitor when employees want to install new software on their office computer. The reason is simple. Companies want to protect themselves and ...

QR code security vulnerability found with Google Glass

Engineers at Lookout Mobile Security have discovered a previously unknown security vulnerability with Google's project Glass wearable headset. Marc Rogers reports on the company's web site that engineers found that when pictures ...

Particle physics for internal security

ETH spin-off Arktis Radiation Detectors Ltd produces special detectors that are in demand for internal security and combating terrorism. The plan moving forward is to develop a mobile detector within the frame of a research ...

Feature stops apps from stealing phone users' passwords

Imagine downloading a NetFlix app to your phone so that you can watch movies on the go. You would expect the app to request your account's username and password the first time it runs. Most apps do.

Explainer: What is a virtual private network (VPN)?

Have you ever wanted to exist in more than one place at the same time? The laws of physics suggest wormholes through space and time are hypothetical; but wormholes do exist in cyberspace and wonders can be found on the other ...

Few festival fans guard against smartphone loss: survey

Ninety-two percent of music festival goers are more likely to bring a smartphone to an event than cash or ID, but many fail to guard against loss or theft, an industry survey Wednesday indicated.

NSA seeks recruits via Twitter

The National Security Agency (NSA) is looking for a few good cybersnoops. This week's furor over top-secret collection of phone records and online data isn't deterring the US government's electronic intelligence-gathering ...

Research finds new channels to trigger mobile malware

(Phys.org) —Researchers at the University of Alabama at Birmingham (UAB) have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware that could eventually lead to targeted attacks launched ...

page 9 from 18