
Transatlantic Cable podcast, episode 98
Dave and Jeff discuss a Florida town that paid to restore data following a ransomware attack, Instagram improving account restoration, and more.
14 articles
Dave and Jeff discuss a Florida town that paid to restore data following a ransomware attack, Instagram improving account restoration, and more.
In this edition, Jeff and Dave discuss third parties reading your Gmail, Samsung’s SMS app leaking photos, NYC pranksters, and more.
Internet of things is not getting any safer: Our experts analyzed a smart camera and found numerous vulnerabilities.
Samsung releases more and more devices with Tizen OS. At SAS 2017, we found out that this OS is highly insecure.
Summarizing the scary security trends coming out of the Mobile World Congress 2016 in Barcelona.
The next step in SIM cards evolution is not about squeezing them into even more miniscule form factor, it’s about replacing them at all — with a profile stored in connected device.
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform
Let’s identify the main IT security and protection trends at MWC 2015.
Find out about the most interesting gadgets presented at the Mobile World Congress 2015 in Barcelona
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
How iOS 8 and Tizen releases affect smartphone market and security landscape.
eBay user passwords compromised in data breach; another Internet Explorer zero-day for Microsoft; Samsung eyes iris authentication; and patches from Chrome.
A number of Samsung’s popular Galaxy devices reportedly contain an alleged backdoor that could give attackers remote control of vulnerable handsets, effectively turning successfully exploited phones into mobile spying machines.
Samsung, maker of handsets and all devices tech-related, has created a secure Android environment called Knox, which aims to resolve the laundry list of security problems facing IT teams as