Selling used Android phones poses huge identity theft risk, expert says
Android users who are looking to sell their old devices should be wary of the possible consequences. McAfee identity theft researcher Robert Siciliano warned that …
Android users who are looking to sell their old devices should be wary of the possible consequences. McAfee identity theft researcher Robert Siciliano warned that …
Notorious hacker group Anonymous has previously stated its intentions to shutdown the Internet on Saturday, March 31st, as a form of protest. “To protest SOPA, …
As a standard security measure, Apple’s iPhone can be set to require a four-digit passcode whenever the phone’s screen is powered on in order to …
Researchers from North Carolina State University have found that mobile applications that integrate advertisements pose privacy and a security risks. The team conducted a study …
The United States Transportation Security Administration recently invested $1 billion in body scanner technology it claimed would make air travel safer, but the scanners have come …
Legislation signed by President Obama directs the Federal Aviation Administration to allow remotely controlled drones to be used by law enforcement agencies, DGR News Service …
Hackers targeted NASA computers, successfully gained access to employee credentials, and took control of systems at NASA’s Jet Propulsion Laboratory, CNN reported on Friday. Paul …
The New York Times reported on Tuesday that due to a permission loophole, third party app developers could access an iPhone’s photo gallery app. The …
Earlier this month it was revealed that the popular social networking app Path was uploading entire iPhone address books to the company’s servers without first gaining …
Last week it was discovered that a number of popular iPhone apps were invading users’ privacy and uploading entire address books to external servers. The data …
Last week, two exploits concerning Google Wallet left users questioning the service’s security. One of the exploits allowed hackers to bypass PIN protection, but it was …
Government deployment of BlackBerry smartphones in the United States has been big business for struggling Canadian handset maker Research In Motion, but the tide seems to …
Apple remained silent as Path and other developers were called out for ostensibly stealing users’ contact data. Without asking for permission or even notifying users …
Path caused quite a stir last week when it was discovered that the app secretly transmitted users’ entire contact lists to its servers. Without giving …
Two recently uncovered security exploits concerning Google Wallet have left users questioning just how safe the product really is. A security firm exposed a vulnerability last …
A new exploit has been discovered that allows unauthorized access to a user’s Google Wallet account with a simple hack that can be performed by …
The security experts at zVelo have discovered a vulnerability in Google Wallet that allows them to “easily reveal” users’ PINs. If a Google Nexus is …
Yesterday it was revealed that the popular social networking app Path was uploading entire iPhone address books to the company’s server. The data uploaded included …
Path, the popular social network that competes with the likes of Instagram, may be uploading your iPhone’s entire address book up to its servers. Arun …
Regulators with the European Union have asked Google to stop rolling out new privacy changes that the company originally introduced earlier this month. “Given the …
Google announced on Thursday that the company has begun to take a more active approach to keeping malware out of the Android Market. The search …
HTC has acknowledged that some the company’s handsets contain a security hole involving the handling of certain data requests while connected to a Wi-Fi network. …
Research In Motion’s latest BlackBerry 7 devices has=ve been granted Federal Information Processing Standard (FIPS) 140-2 certification by the National Institute of Standards and Technology …
Google on Monday announced that the company would combine individual privacy policies from a variety of its products into one main policy. Critics of the change …
Earlier this week, Google announced that the company would combine individual privacy policies from a variety of its products into one main policy. The idea …
IBM and HTC are working together to make Android a more attractive platform for the enterprise market. Executives from both companies recently demoed IBM software …
Twitter finally appears to be preparing a new wave of attacks on the malicious spammers that have overrun the popular social network during the past year. Web …
Research In Motion is currently weighing every single option it can think of in an effort to reverse a negative trend that is approaching a …
Zappos on Sunday confirmed that hackers breached the company’s servers and accessed personal data belonging to many of its customers. The Amazon-owned shoe retailer known …
T-Mobile USA and Motorola have both responded to a request for information on Carrier IQ from Senator Al Franken, and both firms admitted to using …