The Latest in IT Security

Posts Tagged ‘smartphone’

In the latest attack that shows how hard it is for users to identify phone numbers with premium call charges, a researcher has found that he could have earned millions by abusing the online phone verification systems used by Google, Microsoft, and Instagram. Many websites and mobile apps allow users to associate a phone number […]

Read more ...

Smartphones usually keep way more data about you than your communications provider. For example, the built in GPS-receiver provides more accurate location than tracking your mobile phone with cell tower triangulation. Smartphone “interrogations” are automated. It works like any other forensic analysis of a computer: an expert copies all necessary data with the help of […]

Read more ...

IN FEBRUARY 2014, the US ambassador to Ukraine suffered an embarrassing leak. A secret conversation between him and US Assistant Secretary of State Victoria Nuland got posted to YouTube, in which Nuland spoke disparagingly about the European Union. The conversation occurred over unencrypted phones, and US officials told reporters they suspected the call was intercepted […]

Read more ...


Categories

SATURDAY, MAY 18, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments