The Latest in IT Security

Posts Tagged ‘Smartphones’

Several Android smartphone models sold in the US, including via major online retailers like Amazon and BestBuy, had firmware in them that surreptitiously collected and sent detailed personally identifiable information on users and devices to a server based in China. An employee working for DARPA-funded security firm Kryptowire stumbled upon the issue when using a […]

Read more ...

The FBI has demanded that all new homes built starting this year have a rear entrance with a special lock. The homeowner will have the key… but so will the FBI. They state that homeowners can be confident of this key not getting stolen or copied by nefarious criminals. Wait – what? Is this true? […]

Read more ...

Speaking for us mobile researchers, we sometimes classify apps in order to warn users of its presence because of its potential harm, but leave it up to the users’ discretion to remove. This is the case when it comes to a subcategory of PUPs called monitors. Monitoring apps are those that can be great tools […]

Read more ...


Categories

WEDNESDAY, MARCH 12, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments