IT and security teams will need the right building blocks to accommodate a range of use cases. The recent sophisticated attacks on multiple federal agencies by...
A privacy expert called the disclosure “alarming.” The Defense Intelligence Agency buys commercially available cellphone location data and uses this data to search for device locations...
A vulnerability in music-recognition app Shazam could allow an attacker to steal a user’s precise location data using a single malicious URL. UK security researcher Ash...
QR codes have a variety of uses, from storing bank information for payments to ordering at restaurants or joining a WiFi network. But the easy-to-use codes...
A security incident at T-Mobile has resulted in customer call data being accessed, the telecommunications giant has said. The hack, which was first reported on December 29, affected...
T-Mobile has announced a data breach exposing customers’ proprietary network information (CPNI), including phone numbers and call records. Starting yesterday, T-Mobile began texting customers that a...
Security vulnerabilities in the direct file transfer applications of popular smartphone makers allow attackers to send malicious files to mobile devices, a security researcher has found. In a...
This week Samsung has started rolling out Android’s December security updates to mobile devices to patch critical security vulnerabilities in the operating system and related components. This...
The proliferation of consumer-grade communications applications has given rise to widespread, unsanctioned use throughout the military community. After nearly two decades on the ground, President Trump’s...
Hundreds of millions of Android users are potentially exposed to the risk of hack due to the use of Android Play Core Library versions vulnerable to...
Recent Comments