Tag Archives: Mobile Security

Moore’s Law leaves mobile networks ripe for attack

Source: The Register by  Iain Thomson In this article “The GSM mobile standard is wide open for attack, experts have warned, thanks in part to the increasing amount of computing power available to hackers. “Voice interception capability really depends on how much processing power you have,” said Aaron Turner, cofounder of security specialists N4struct, speaking at the RSA 2012… Read More »

iPhone photo-slurping loophole sparks app privacy fears

Source: The Register by John Leyden In this article “Exactly how much data can be extracted from iPhones by apps without explicit user consent has been called into question after it emerged that software granted access to location-finding services can siphon off punters’ photos. The extraction of address book information without permission from the user has already raised privacy… Read More »

UK-French drone aircraft blueprints nicked at Paris station

Source: The Register by John Leyden In this article “Old-school crooks managed to steal documents related to secret plans to build a joint French-British drone aircraft after snatching a briefcase at a Paris railway station. The briefcase was stolen from an executive at French defence contractor Dassault Aviation while he and a colleague were in the process of purchasing… Read More »

Analyze mobile apps for malware threats

Source: Help Net Security In this article “Trend Micro announced Mobile App Reputation, a technology that can automatically identify, analyze and rate mobile applications for issues that could include malware, potential theft of private data and system resource abuse including battery, memory, and bandwidth. By analyzing the underlying code and the websites that the app connects to, and… Read More »

Google Wallet falls open after casual hack

Source: The Register by Bill Ray Yikes Google!!! In this article “Turns out it’s not necessary to decrypt the PIN, or even hack into Google’s Wallet, just ask the phone nicely and it will let anyone root though its innards. … Run the Google Wallet after removing its data and it assumes it is being run for the first time,… Read More »