A security flaw in Apple’s new predictive keyboard suggests passwords from other programs, apps and websites.
Malware is following us from our computer to our phones – so much so it’s now easier to obtain malicious malware from any mobile ads, even if you’re not using your phone to watch porn.
The findings come from Blue Coat: in February of 2014, 1 in 5 attacks on mobile phones actually came from malicious ads. That’s a 400% increase insect Nov. 2012, compared to porn, which fell to only 16% of all attacks. Read more
Hackers gained access to nearly 5 million Snapchat accounts, posting their usernames and phone numbers to the web New Year’s Eve, according to several reports.
The hackers, identified only by the website name — SnapchatDB.info — told the media they were motivated to publish the file of 4.6 million users’ private information as a way to bring attention to known security flaws in the popular app. They also said that they had kept the last two numbers of each phone number hidden. Read more
Facial recognition usually makes us all a bit suspicious, but this new Facecrypt app harnesses that computational power for good. It’s a password management app that allows you to use your face as an added password. For added security, you can also add Liveness Detection to your password keychain to make sure blinking and other facial movements to thwart pirates who may have photos of you.
Like other facial recognition algorithms, the app does not keep a record of your photo - just measurements of it:
FaceCrypt takes measurements of your face and processes them transparently and quickly into a unique data set. On enrolment, the same measurement process happens again and compared against the original enrolled encrypted face. Of course this will not be 100% like for like since facial position, expression and lighting conditions will have differed. Even with variances, FaceCrypt has built in intelligence to still detect if you are the same person and authorised owner of the vault. Read more
Mobile apps often ask for personal data to perform their tasks. “This app would like access to your email address, friends’ list, photos, etc., etc.,” right? And we all just click the “OK, sure” button. A recent study from HP, though, suggests app developers need to focus more on keeping that personal information safe.
Nine out of 10 of the more than 2,000 iOS apps HP tested possessed a vulnerability that could represent a security threat. It also found that 97 percent of mobile apps accessed at least one piece of personal information–and 86 percent of those apps did not have proper measures in place to protect your data from “the most common exploits.” Read more
In a startling and ironic introduction to Cyber Security Awareness Month, design software company Adobe admitted its servers were breached by hackers who accessed usernames, passwords, and financial information from nearly 3 million customers. The breach occurred in August, but the company was not aware of the hack until mid-September when security researcher and journalist Brian Krebs noticed Adobe’s source code on servers used for previous hacking attempts.
In its update to its Android mobile security app, Lookout today included a new feature it hopes will address the most basic security problem users face: phone thieves.
Backgroundcheck.org has created an infographic called, “Privacy & Data Management on Mobile Devices,” which explores how phones can put you at risk for sharing your personally identifiable information.
We’ve embedded the entire chart after the jump for you to check out. All media professionals should be aware of mobile security.
Here is more from the graphic: “Today, our phones can be a treasure true of not only memories, but personally identifiable information. This puts us at a disadvantage not only if we lose our phone, but when we download certain apps that quietly amass our data. Here’s a look at how Americans manage these data and security issues.” Read more
At the Where 2.0 conference Alasdair Allan and Pete Warden announced they have found that the iPhone and iPad 3G is collecting and storing location information on the device. The collection of the data has been occuring since the release of iOS 4. The information does not appear to be transmitted from the phone, but it is being stored unencrypted and unprotected on the device, although the only way to access the data is via the PC where you back up your iPhone.
For the most part we think of Android as a consumer focused smartphone operating system, but that doesn’t mean that Google doesn’t have aspirations of having corporations using it. In order for Android to get adoption by corporations it needs to be secure and easily managed. Google provides the ability for those who use Google Apps for Business and Google Apps for Education to remotely manage and secure Android phones.