With RSA and Mobile World Congress going on, when you go to conference do you use Wi-Fi? Whether it is a conference, or simply taking advantage of a coffee shop or airport hot spot, if you leave your phone enabled to connect wirelessly, then it is too easy for a hacker to hijack your connection with a WiFi Pineapple, Firesheep, or plant another “hot spot” router to which you automatically connect. Hello man-in-the-middle (MITM) attack! At Black Hat, I watched hundreds of “security-minded” people get their connections hijacked by Itzhak "Zuk" Avraham, otherwise known as @ihackbanme.
After desktops and phones, Ubuntu is now bringing its Linux distribution to tablets. Coming Thursday, preview images for Google's Nexus tablets will be released, so we can all get a good long look at what Canonical is cooking up. They've published a YouTube video which details all that Ubuntu has to offer for tablets, and to be honest, it's looking quite good.
The Federal Communications Commission on Thursday launched a smartphone security checker website to help consumers ensure their devices are as secure as possible.
The page lists various mobile operating systems and also points to a general checklist of actions users can take to secure their smartphones.
A report by Malaysian daily The Star on Sunday said that the country logged 24 cases of electronic hacking involving RM3.3 million in losses. The hacking of smartphones took place between January and September 2012.
The reports highlights the vulnerability of smartphones to cyber hacking and other malicious threats through the mobile phones' short messaging service (SMS) which is celebrating 20 years of use on Dec 3, Monday.
An attacker can steal your contacts, snoop on your email and erase all data from your iPhone or Android device using Microsoft Exchange, a Perth university lecturer has revealed.
Peter Hannay discovered that by pushing policy to phones he could wipe the devices clean and likely steal data and sniff outgoing emails.