security

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

New ‘Masque Attack’ iOS phishing vulnerability sideloads apps

On the heels of WireLurker, a new iOS threat has been discovered. This one, called Masque attack, could be a lot more problematic, too. While the previously discovered WireLurker vulnerability required users to be tethered to a Mac before anything nefarious could happen, Masque Attack is one that occurs in-app. Discovered by security research firm FireEye, Masque Attack could pose a much bigger risk to anyone using apps that didn’t come pre-loaded on their iPhone, iPod, or iPad.

Continue Reading

Phishing scams 45% successful according to Google study

Phishing scams 45% successful according to Google study

You would think that we've been taught and warned enough to recognize the signs of phishing attempts, those emails and websites designed to trick us into entering usernames and passwords for things like email, Facebook, and online banking, often designed to look authentic, but still not appearing quite right. Well, it turns out a number of internet users are still falling victim to such scams. A very large number of users, according to a study from Google and the University of California, San Diego.

Continue Reading

Wiper app now lets you make free encrypted calls

Wiper app now lets you make free encrypted calls

Secure messaging is a big deal to many, with ephemeral services like Snapchat a popular choice. Still, that service has been violated many times, leading some to search for a new path forward. The last time we talked about Wiper, the service was new, and pretty amazing. For a messaging platform, the encrypted app-to-app pipeline and ability to clear the chat on both ends is special. The company has recently released version 2.0 of their app, bringing the encrypted platform full circle.

Continue Reading

Apple blocks WireLurker iPhone malware apps

Apple blocks WireLurker iPhone malware apps

Apple has blocked the suspect apps behind the WireLurker malware discovered targeting iPhone users in China, effectively minimizing the likelihood of casual infections. The exploit made headlines yesterday for its supposed virulence, watching out for iOS devices being connected to compromised Macs and then grabbing data from them. According to Apple, however, the issue has already been addressed for the most part, while a little common-sense could prevent anyone still at risk from succumbing.

Continue Reading

Netgear Arlo cuts all cords for weatherproof security cameras

Netgear Arlo cuts all cords for weatherproof security cameras

Netgear has launched a new wireless security camera, Arlo, promising complete liberation from wires thanks to WiFi and some long-lasting batteries. Streaming 720p video to iOS and Android apps, and delivering low-light vision for nighttime use, the Arlo cameras are weatherproof for outdoor use. At first glance, then, they seem like the ideal alternative to a Dropcam for the wire-averse; however, there are some compromises to be made if you want to cut your cords completely.

Continue Reading

Sharp’s new infrared color camera is first of its kind

Sharp’s new infrared color camera is first of its kind

Sharp's clinically-named LZ0P420A Infrared Color Night-Vision Camera looks like most of the other slim connected security cameras on the market: it is cylindrical and hinged with a lens surrounded by infrared LEDs. The big difference comes in its functionality -- this is the first camera of its kind able to record color footage is completely dark settings, boosting the quality available to businesses and others in need of a security setup.

Continue Reading

BeON smart bulbs learn light patterns to scare away invaders

BeON smart bulbs learn light patterns to scare away invaders

It's a common tactic: if you're going to be away from home overnight, you leave a lamp on. This will hopefully make opportunistic thieves think twice before breaking in, leaving doubt about whether someone is home. This is an old trick, though, one that has since been augmented with light timers to simulate something a bit more real. That is the basis upon which BeON, a new smart light bulb system, is designed -- and, unlike lamps and timers, BeON bulbs include a few extra features that'll cover all the bases.

Continue Reading

Samsung clarifies Find My Mobile vulnerability

Samsung clarifies Find My Mobile vulnerability

Samsung has broken its silence regarding a reported security exploit that exists in its Find My Mobile service. That security hole could have potentially let hackers remotely lock, unlock, and ring a targeted device from Samsung's web service. Scary as that may sound, the OEM insists that not only would the hackers be limited to only those three actions, it would require a specific set of circumstances for the exploit to be used, which hopefully leaves majority of users unaffected and out of harm's way.

Continue Reading

Facebook details big uptick in government data requests

Facebook details big uptick in government data requests

Facebook has released its third report on government data requests, and in it we see a substantial uptick in requests during the first half of this year in comparison to the last six months of 2013. According to the report, government requests for both content restriction and for user data jumped 24-percent, with content restriction due to local laws rising by 19-percent. The report includes data about national security requests, as well, though they're again restricted to only a general range rather than a precise number.

Continue Reading

Cocoon smart monitor listens for shock waves to detect intruders

Cocoon smart monitor listens for shock waves to detect intruders

Another connected home security device has surfaced, this one designed to be both simplistic and highly sensitive to when a problem arrives. It achieves this sensitivity using what the makers call SUBSOUND technology, which is said to allow the device to detect motion in a different room, no other sensors needed. This is joined, as you'd expect, by a smartphone app that lets you peek through the Cocoon's integrated camera. If someone is poking around who isn't welcomed, there's an alarm that can be triggered, as well.

Continue Reading

Prev 1 2 3 4 5 6 7 Next