Read more about smartphones
Bookmark and Share
  • Blackphone security issues and vulnerabilities unveiled

    09.09.2014

    Blackphone, the carrier- and vendor-independent smartphone that was created with the goal of placing privacy and control directly in the hands of its users, is not without its flaws, the Bluebox Security team discovered while reviewing it.

  • 9 ways to protect data on your smartphone

    04.09.2014

    Recent headlines of Hollywood celebrities’ nude photos leaking onto the Internet remind us of the privacy risks we face when we store personal data – particularly very personal data – on smart devices.

  • California phone kill-switch law could lead to abuse

    27.08.2014

    On Monday, California Governor Jerry Brown signed into law a bill (SB 962) that will require any smartphone sold in the state after July 1, 2015, to include a software or hardware (or both) "kill switch" that "can render inoperable the essential features of the smartphone to an unauthorized user", i.e.

  • Sneak attack through smartphone shared memory

    22.08.2014

    A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.

  • Blackphone rooted at DEF CON?

    11.08.2014

    Blackphone, the recently released security-oriented smartphone, has apparently been rooted.




Spotlight

The context-aware security lifecycle and the cloud

Posted on 25 November 2014.  |  Ofer Wolf, CEO at Sentrix, explains the role of the context-aware security lifecycle and illustrates how the cloud is shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Nov 26th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //