Remove technology smartphones
article thumbnail

How Patched Android Chip Flaw Could Have Enabled Spying

Data Breach Today

Check Point Report Describes Flaw's Technical Details A severe vulnerability in a system on certain Qualcomm chips, which has been patched, potentially could have enabled attackers to remotely control Android smartphones, access users' text messages and listen in on conversations, according to a new report from Check Point Software Technologies.

Access 292
article thumbnail

Researchers Propose COVID-19 Tracking App

Data Breach Today

Smartphone App Would Warn of Proximity to Those With Virus While Protecting Privacy Researchers at Boston University have written a research paper that proposes creating a smartphone app that uses short-range transmission technologies that can inform users if they have been in close proximity to a person infected with COVID-19 - while maintaining privacy. (..)

Paper 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Businesses gravitate to ‘passwordless’ authentication — widespread consumer use up next

The Last Watchdog

Passwordless technology is certainly ready for prime time; innovative solutions from suppliers like Cisco’s Duo, Hypr, OneLogin and Veridium have been steadily gaining traction in corporate settings for the past few years. He or she simply uses his or her smartphone to scan the QR code. Here are a few takeaways. Security + efficiency.

article thumbnail

Another Event-Related Spyware App

Schneier on Security

The app also provides Egypt’s Ministry of Communications and Information Technology, which created it, with other so-called backdoor privileges, or the ability to scan people’s devices. It can also track people’s locations via smartphone’s built-in GPS and Wi-Fi technologies, according to two of the analysts.

article thumbnail

Crickets from Chirp Systems in Smart Lock Key Leak

Krebs on Security

.” Using those hard-coded credentials, Brown found an attacker could then connect to an application programming interface (API) that Chirp uses which is managed by smart lock vendor August.com , and use that enumerate and remotely lock or unlock any door in any building that uses the technology.

Analytics 270
article thumbnail

LibTech EdTech – transition, challenges and contradictions

CILIP

CILIP Copyright COnference 2024 By Gary Horrocks THE summer 2023 issue of UKeiG’s open access journal, eLucidate , featured my reflections on the implications of a Members’ Day presentation by Ken Chad on the “library technology ecosystem". We’re all acutely aware of Brianna Ghey’s mother calling for social media safeguarding.

article thumbnail

New Kids On The Block: Novel Tactics and Perpetrators

Data Breach Today

Know Your Enemy: How banks can identify and beat the evolving threat of financial crime Mobile technology allows customers complete control over their banking security via their smartphones, however recent fraud cases have seen criminals virtually hijacking mobile phones to intercept alerts and texts.

Security 134