HackDig : Dig high-quality web security articles for hacker

Oreo and the sweet history of Android versions

Oreo Android, the sweetest version? What does an Oreo cookie, a donut, a marshmallow or a lollipop have to do with your smartphone? Well, believe it or not, the names of all those sweets indicate the Android operating system installed on your cell phone. After months of speculation about the new features to be included in the new Android operating system, Au
Publish At:2017-08-29 02:40 | Read:193 | Comments:0 | Tags:Mobile News Mobile Security Technology Android smartphones

iOS 11 in the Enterprise: Get Your iPads Ready

While some are in back-to-school mode and others are getting ready for football, we’re gearing up for the latest mobile operating systems to hit the market. With the Apple iOS 11 release right around the corner, the time is now for IT and security leaders to zero in on their Apple iOS management strategy to prepare for the myriad changes set to affec
Publish At:2017-08-23 22:25 | Read:234 | Comments:0 | Tags:Mobile Security Apple apple releases Enterprise Mobility iOS

SMS Scams and Smartphone Malware

Smartphones have become a crucial part of our everyday lives; we shop, bank and network using our phones. But with so much valuable personal data being stored on these devices, they have become a top target for cyber criminals. If they can crack our phones, they can steal our identities, blackmail us for cash, or empty our bank accounts using scams. As a res
Publish At:2017-07-25 22:40 | Read:290 | Comments:0 | Tags:Mobile Security Malware scams smartphones sms

Charger, the Most Costly Ransomware to Smartphone Users

Ransomware is evolving and becoming increasingly sophisticated, posing a greater threat to companies and private users alike. This malicious software has shown that it can propagate by using the viral mechanisms of a meme, that it can directly attack corporate servers, or even camouflage itself in false resumes. And now it has made its way to other devices,
Publish At:2017-03-29 12:55 | Read:547 | Comments:0 | Tags:Security app security Ransomware smartphones

Your Android lock pattern can be cracked in just five attempts

  If you use a lock pattern to secure your Android smartphone, you probably think that’s the perfect way to avoid unwanted intrusions. However, that line you draw with your finger may be a bit too simple. After all, if even Mark Zuckerberg himself used ‘dadada’ for all of his passwords, it is not surprising that your lock pattern may b
Publish At:2017-03-14 22:15 | Read:614 | Comments:0 | Tags:Security Android lock pattern smartphones

Access Cards Will Disappear from 20% of Offices within Three Years

  You arrive at the office, you approach the security gates, you swipe your card and start the day. It’s one of the motions that a large percentage of the workforce goes through daily, because today, and it seems that for a while yet, the access card is still the reigning security device for entering corporate offices. By 2016, less than 5% of organizat
Publish At:2017-02-14 20:25 | Read:641 | Comments:0 | Tags:Security access cards businesses smartphones

What about the personal data on those millions of recalled Note7s?

The users of millions of faulty Samsung Galaxy Note7s, already turned in, face a bigger potential dilemma than whether the devices might blow up: The fate of their personal data on the devices.Many of the users of some 3 million Note7 devices sold were told by Samsung and government officials to immediately stop using the devices. They most likely didn'
Publish At:2016-11-05 09:50 | Read:1077 | Comments:0 | Tags:Security Privacy Smartphones Data Protection Consumer Techno

Black Hat Europe: IoT devices can hack phones

The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.Flaws in Belkin WeMo devices - electrical switches, cameras, light bulbs, coffee makers, air purifiers, etc. – enabled Invincea Labs researchers to not only hack into the devices, but t
Publish At:2016-11-03 02:50 | Read:880 | Comments:0 | Tags:Internet of Things Security Mobile Security Smartphones Andr

To unlock phones, feds demand all occupants surrender fingerprints

U.S. investigators are exercising a broad legal authority to force suspects to unlock their smartphones. In a recent case, they demanded that anyone found inside a California residence comply by surrendering their fingerprints.In May, the federal prosecutors made the request as part of a search warrant, according to a court filing uncovered by Forbes. Th
Publish At:2016-10-17 18:05 | Read:940 | Comments:0 | Tags:Security Privacy Smartphones Legal

Are you willing to gamble your company’s security with the new iPhone 7?

Apple has taken the world by storm once again with the release of the latest version of its top-of-the-range smartphone. Two new iPhones, the 7 and the 7 Plus, are on the Smartphone market with some standout novelties: the absence of the classic headphone Jack and the addition of two new and improved cameras. Unfortunately, the topic of cybersecurity was ab
Publish At:2016-09-29 09:05 | Read:856 | Comments:0 | Tags:Mobile Security Apple businesses cybersecurity smartphones

Note7 iris scanner not quite ready for prime time (video)

Samsung's impressive new Galaxy Note7 smartphone is a genuine tech-spec powerhouse.Across the board, the Note7's hardware is top of the line. Its large display is glorious, for example. It comes with 64GB of built-in storage — and it supports microSD memory cards. The phone is made with premium materials, such as Corning Gorilla Glass and steel.
Publish At:2016-08-19 08:20 | Read:980 | Comments:0 | Tags:Smartphones Android Security Biometrics Consumer Technology

Laptops most often stolen from most unlikely place

The rise of mobile in the enterprise has led many CIOs to become concerned about the potential for data loss due to a lost or stolen device — phones, laptops and the like lost in taxis, restaurants and hotel rooms. But a new study has found that CIOs also need to spend more time focusing on the office itself.In July of this year, Kensington, a su
Publish At:2016-08-16 07:05 | Read:1206 | Comments:0 | Tags:Security Data Protection Data Breach Laptops Physical Securi

Taking stock of Apple's 2016 acquisitions

Apple’s acquisition this past week of Turi, a Seattle machine learning company that has its roots in the open source GraphLab project, brings to six the number of deals Apple has made this year that have gone public. So while Apple’s $2.5 billion in R&D spending during its recently completed second quarter represented a 25% increase over the
Publish At:2016-08-11 17:25 | Read:947 | Comments:0 | Tags:Smartphones iOS Hardware Security Analytics Mergers and Acqu

Snowden and Huang hope to help smartphones go dark

“Privacy is dead,” has been a mantra, for different reasons, for generations. In the cybersecurity community, it has been conventional wisdom for at least a decade. But Edward Snowden and Andrew “bunnie” Huang apparently think they can revive it a bit, at least if you own an iPhone 6.Their goal, they say in a white paper titled, “Against the Law
Publish At:2016-08-11 17:25 | Read:862 | Comments:0 | Tags:Mobile Security Security Skills and Training Smartphones

There’s never a shortage of security holes

Information security is a job that can never be completed. Threats multiply, and new vectors of attack become apparent. A couple of new ones were publicized in last week.For starters, internet security company Bastille advised that thieves can access a wireless keyboard’s “unencrypted radio communication protocols, enabling an attacker to eavesdr
Publish At:2016-08-09 10:25 | Read:594 | Comments:0 | Tags:Security Smartphones Privacy

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud