Archive for the ‘Smart Phone’ Category

Have you heard about the Pwn Phone 2014?

by Jamie Titchener If you have to undertake vulnerability scans or penetration tests at remote sites as part of your day-to-day activities, having to lug around a laptop and other scanning and penetration testing kit can be a real pain. Having the right tools for the job is crucial. But how can you ensure you […]

Leave a Comment

Is biometric authentication a new standard for Smartphone’s

biometric authentication Biometric device rely on measurement of biological characteristic of an individual such as fingerprinting, hand geometry, voice recognition and Eris pattern. In this post we will discuss if biometric authorization is going to become a standard technology in the future especially the Finger Print technology which matches with loops and whorls of the […]

Leave a Comment

10 reasons to ponder before using your smartphone for banking

  Mobile Payment Security 01) There is no clear legislation that sets out your rights to receive a refund if your bank account is fraudulently emptied due to mobile bank app insecurity. The burden of proof seems to be on the user to protect their handset, operating system, software, mobile operator infrastructure and everything else […]

Leave a Comment

The Mobile Security Show: Improving Mobility Infrastructure Security Standards

For more episodes of The Mobile Security Show, visit A discussion on Mobility Standards moves towards a rousing conversation about mobility and privacy. Originally recorded at NYU Poly on November 16, 2011. Topic: “Dealing With Exploitable Mobile Device Vulnerabilities” Hosts: Veronica Belmont – Technology Video Host Dino Dai Zovi – Information Security Professional & […]

Leave a Comment

iPhone 4 hackers open password marketplace

A huge source of personal data in the palm of your hand – that’s what a smartphone has become nowadays. But all the private information kept on your hi-tech device can easily become public knowledge. Privacy For Sale: iPhone 4 hackers open password marketplace Smartphone security: here’s how to start securing smartphones and the data […]

Comments (7)

California governor allows warrantless search of cell phones

Here’s another reason to password-protect your mobile phone: California’s governor just recently vetoed a bill that requires a court-ordered warrant in order to search mobile phones upon arrest. This means that if you get arrested in the state of California, the arresting officer can search your smartphone — which gives him access to emails, call […]

Leave a Comment

Mobile Malware

Lookout Mobile Security By Mandira Srivastava Do you think it is safe to access sensitive data on mobile phone? Do you know that malware can steal valuable information from your phone? As smartphone sales are growing, the development of mobile malware, viruses that penetrate the security system of mobile devices, also increases. Mobile malware has […]

Leave a Comment

RSA conference looks at online vulnerability

By James Temple The hottest trends in technology also represent some of the gravest threats to corporate data security. Mobile devices, social networking and cloud computing are opening up new avenues for both cyber criminals and competitors to access critical business information, according to speakers at this week’s RSA Conference 2011 at San Francisco’s Moscone_Centerand […]

Comments (3)

Biggest mobile malware threat

Image via CrunchBase Facebook is biggest mobile malware threat, says security firm Researcher claims bad links on Facebook responsible for much higher infection rate that targeted mobile malware By Joan Goodchild -CSO The biggest mobile infection threat isn’t malware that specifically targets mobile devices, according to new research from security firm BitDefender. Malware that targets […]

Leave a Comment

SmartPhone and Security

Mobile spyware is malicious software which is used to spy and control mobile devices (BlackBerry, PDAs, Windows Mobile and Cell Phones). Mobile spyware will not only intercept the message between two devices but also determine the location of the device. Basically, mobile spyware software is installed on a mobile device to spy on them. Small […]

Comments (1)