BlackBerry's Android upgrade track record should give anyone pause

Credit to Author: JR Raphael| Date: Thu, 28 Jun 2018 08:56:00 -0700

Hey, look: A new BlackBerry phone is here! And no, you didn’t just wake up from a 12-year coma. I promise you, it is still 2018.

The new BlackBerry Key2, however, is aimed squarely at those who miss the glory days of the physical-keyboard-packin’ phone — specifically, business users who still place some sort of value on the BlackBerry name (even if it’s technically a different organization making the devices now). The company’s own landing page for the device placards that focus plainly:

To read this article in full, please click here

Read more

Supreme Court: Your digital location is protected by the Constitution

Credit to Author: Lucas Mearian| Date: Fri, 22 Jun 2018 12:15:00 -0700

The U.S. Supreme Court today ruled that access to historical cell-site records of a person’s location based on their mobile phone will require law enforcement to obtain a warrant before searching a person’s historical location records.

This is the first time the high court has ruled on whether a phone subscriber has a legitimate expectation of privacy regarding a telephone company’s records of their cellphone location data, according to Aloke Chakravarty, a partner in the Denver-based law firm of Snell & Wilmer.

“This is a landmark case for privacy, and how the court will deal with emerging technologies going forward,” Chakravarty said via email. “It creates a new lens through which to view a government’s ability to obtain third-party records where a criminal defendant neither possesses the records, doesn’t have a property interest in them, may not even know they exist, and he cannot personally even access them.”

To read this article in full, please click here

Read more

Fake Fortnite for Android links found on YouTube

Credit to Author: Nathan Collier| Date: Wed, 20 Jun 2018 19:00:41 +0000

The extremely popular video game Fortnite is coming to Android sometime this summer, and the fanbase is going wild. Not surprisingly, mobile malware developers are taking advantage. Already, there are several videos on YouTube with links claiming to be versions of Fortnite for Android. Spoiler alert: they’re fake.

Categories:

Tags:

(Read more…)

The post Fake Fortnite for Android links found on YouTube appeared first on Malwarebytes Labs.

Read more

Apple wins praise for adding 'USB Restricted Mode' to secure iPhones

Credit to Author: Lucas Mearian| Date: Thu, 14 Jun 2018 12:43:00 -0700

Apple confirmed today it will close a security hole that has allowed law enforcement officials, working with forensic companies, to break into iPhones to retrieve data related to criminal investigations.

In the upcoming release of iOS 12, Apple will change default settings on iPhones to shutter access to the USB port when the phone has not been unlocked for one hour. In its beta release of iOS 11.3, Apple introduced the feature – known as USB Restricted Mode – but cut it from iOS 11.3 before that version was released publicly.

To read this article in full, please click here

Read more

Which Android phones get regular security updates? Here's a hint

Credit to Author: JR Raphael| Date: Thu, 14 Jun 2018 08:48:00 -0700

Read more

Is your company part of the GDPR 'mobile loophole'?

Credit to Author: Jack Gold| Date: Thu, 14 Jun 2018 08:13:00 -0700

Mobile tech, and especially mobile brought into companies through BYOD, has unique challenges for companies that need to comply with General Data Protection Regulations (GDPR) — and that’s virtually all companies, not just the ones in Europe. The regulations compel companies to manage personal data and protect privacy, and they provide individuals to have a say in what and how data about them is used.

GDPR has several disclosure and control requirements, such as providing notice of any personally identifiable data collection, notifying of any data breaches, obtaining consent of any person for whom data is being collected, recording what and how data is being used, and providing a right for people whose data is being collected to see, modify, and/or delete any information about them from corporate systems.

To read this article in full, please click here

Read more

Apple bans cryptocurrency mining apps on iOS to protect mobile users

Credit to Author: Lucas Mearian| Date: Tue, 12 Jun 2018 12:36:00 -0700

Using an iPad or iPhone to mine bitcoin or other cryptocurrencies would be hard to do, as the CPU power available to complete the task would be a drop in the bucket compared to what’s needed.

But using a portion of the CPU power from thousands of iPads or iPhones to mine cryptocurrency makes more sense – and that’s exactly what some malware has been doing.

Apple is now moving to stop the practice.

[ Further reading: The way blockchain-based cryptocurrencies are governed could soon change ]

To read this article in full, please click here

Read more

A week in security (June 4 – June 10)

Credit to Author: Malwarebytes Labs| Date: Mon, 11 Jun 2018 16:02:13 +0000

A roundup of the security news from June 4 – June 10, including IoT botnets, government attacks, dodgy Wi-Fi, and more.

Categories:

Tags:

(Read more…)

The post A week in security (June 4 – June 10) appeared first on Malwarebytes Labs.

Read more