HackDig : Dig high-quality web security articles for hacker

How to use your new phone at work (safely)

Did you get a new phone for Christmas? You’re not alone – smartphones are a popular gift each year. You’re probably also eager to use your new phone at work. You can send and receive work email, use Skype or WhatsApp to chat with your colleagues, and you can take calls any place any time. You’re a productivity powerhouse – if your boss agrees to
Publish At:2020-01-08 09:15 | Read:316 | Comments:0 | Tags:Mobile News Security smartphones tips

Should you ditch charging cables?

The latest Android and Apple smartphones all offer a new technology called ‘inductive charging’. You simply place the phone on a compatible ‘pad’ and the battery recharges wirelessly. Obviously this is great news for those of us who regularly lose our charging cables, or struggle to insert the plug correctly. But is inductive charging as useful as the manufa
Publish At:2019-09-23 10:35 | Read:525 | Comments:0 | Tags:Mobile News Technology Charging cybersecurity smartphones Wi

Cybercrime’s Most Wanted: Four Mobile Threats that Might Surprise You

It’s hard to imagine a world without cellphones. Whether it be a smartphone or a flip phone, these devices have truly shaped the late 20th century and will continue to do so for the foreseeable future. But while users have become accustomed to having almost everything they could ever want at fingertips length, cybercriminals were busy setting up shop. To tri
Publish At:2019-09-19 23:20 | Read:786 | Comments:0 | Tags:Consumer Mobile and IoT Security cellphones fake apps fake n

Oreo and the sweet history of Android versions

Oreo Android, the sweetest version? What does an Oreo cookie, a donut, a marshmallow or a lollipop have to do with your smartphone? Well, believe it or not, the names of all those sweets indicate the Android operating system installed on your cell phone. After months of speculation about the new features to be included in the new Android operating system, Au
Publish At:2017-08-29 02:40 | Read:3702 | Comments:0 | Tags:Mobile News Mobile Security Technology Android smartphones

iOS 11 in the Enterprise: Get Your iPads Ready

While some are in back-to-school mode and others are getting ready for football, we’re gearing up for the latest mobile operating systems to hit the market. With the Apple iOS 11 release right around the corner, the time is now for IT and security leaders to zero in on their Apple iOS management strategy to prepare for the myriad changes set to affec
Publish At:2017-08-23 22:25 | Read:3711 | Comments:0 | Tags:Mobile Security Apple apple releases Enterprise Mobility iOS

SMS Scams and Smartphone Malware

Smartphones have become a crucial part of our everyday lives; we shop, bank and network using our phones. But with so much valuable personal data being stored on these devices, they have become a top target for cyber criminals. If they can crack our phones, they can steal our identities, blackmail us for cash, or empty our bank accounts using scams. As a res
Publish At:2017-07-25 22:40 | Read:2987 | Comments:0 | Tags:Mobile Security Malware scams smartphones sms

Charger, the Most Costly Ransomware to Smartphone Users

Ransomware is evolving and becoming increasingly sophisticated, posing a greater threat to companies and private users alike. This malicious software has shown that it can propagate by using the viral mechanisms of a meme, that it can directly attack corporate servers, or even camouflage itself in false resumes. And now it has made its way to other devices,
Publish At:2017-03-29 12:55 | Read:4807 | Comments:0 | Tags:Security app security Ransomware smartphones

Your Android lock pattern can be cracked in just five attempts

  If you use a lock pattern to secure your Android smartphone, you probably think that’s the perfect way to avoid unwanted intrusions. However, that line you draw with your finger may be a bit too simple. After all, if even Mark Zuckerberg himself used ‘dadada’ for all of his passwords, it is not surprising that your lock pattern may b
Publish At:2017-03-14 22:15 | Read:3128 | Comments:0 | Tags:Security Android lock pattern smartphones

Access Cards Will Disappear from 20% of Offices within Three Years

  You arrive at the office, you approach the security gates, you swipe your card and start the day. It’s one of the motions that a large percentage of the workforce goes through daily, because today, and it seems that for a while yet, the access card is still the reigning security device for entering corporate offices. By 2016, less than 5% of organizat
Publish At:2017-02-14 20:25 | Read:2964 | Comments:0 | Tags:Security access cards businesses smartphones

What about the personal data on those millions of recalled Note7s?

The users of millions of faulty Samsung Galaxy Note7s, already turned in, face a bigger potential dilemma than whether the devices might blow up: The fate of their personal data on the devices.Many of the users of some 3 million Note7 devices sold were told by Samsung and government officials to immediately stop using the devices. They most likely didn'
Publish At:2016-11-05 09:50 | Read:4310 | Comments:0 | Tags:Security Privacy Smartphones Data Protection Consumer Techno

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.Flaws in Belkin WeMo devices - electrical switches, cameras, light bulbs, coffee makers, air purifiers, etc. – enabled Invincea Labs researchers to not only hack into the devices, but t
Publish At:2016-11-03 02:50 | Read:3434 | Comments:0 | Tags:Internet of Things Security Mobile Security Smartphones Andr

To unlock phones, feds demand all occupants surrender fingerprints

U.S. investigators are exercising a broad legal authority to force suspects to unlock their smartphones. In a recent case, they demanded that anyone found inside a California residence comply by surrendering their fingerprints.In May, the federal prosecutors made the request as part of a search warrant, according to a court filing uncovered by Forbes. Th
Publish At:2016-10-17 18:05 | Read:3560 | Comments:0 | Tags:Security Privacy Smartphones Legal

Are you willing to gamble your company’s security with the new iPhone 7?

Apple has taken the world by storm once again with the release of the latest version of its top-of-the-range smartphone. Two new iPhones, the 7 and the 7 Plus, are on the Smartphone market with some standout novelties: the absence of the classic headphone Jack and the addition of two new and improved cameras. Unfortunately, the topic of cybersecurity was ab
Publish At:2016-09-29 09:05 | Read:3908 | Comments:0 | Tags:Mobile Security Apple businesses cybersecurity smartphones

Note7 iris scanner not quite ready for prime time (video)

Samsung's impressive new Galaxy Note7 smartphone is a genuine tech-spec powerhouse.Across the board, the Note7's hardware is top of the line. Its large display is glorious, for example. It comes with 64GB of built-in storage — and it supports microSD memory cards. The phone is made with premium materials, such as Corning Gorilla Glass and steel.
Publish At:2016-08-19 08:20 | Read:3987 | Comments:0 | Tags:Smartphones Android Security Biometrics Consumer Technology

Laptops most often stolen from most unlikely place

The rise of mobile in the enterprise has led many CIOs to become concerned about the potential for data loss due to a lost or stolen device — phones, laptops and the like lost in taxis, restaurants and hotel rooms. But a new study has found that CIOs also need to spend more time focusing on the office itself.In July of this year, Kensington, a su
Publish At:2016-08-16 07:05 | Read:5312 | Comments:0 | Tags:Security Data Protection Data Breach Laptops Physical Securi


Share high-quality web security related articles with you:)


Tag Cloud