Cryptominers on Google Play: how Sophos protects customers

Credit to Author: Bill Brenner| Date: Thu, 01 Feb 2018 17:38:24 +0000

SophosLabs has discovered a new, worrisome dimension to the trend of attackers targeting Android mobile users for cryptocurrency mining<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/cdLYcpn6-80″ height=”1″ width=”1″ alt=””/>

Read more

Pixel 2: The year’s best smartphone

Credit to Author: Steven J. Vaughan-Nichols| Date: Wed, 27 Dec 2017 09:35:00 -0800

Read more

How to securely erase your Android device in 4 steps

Credit to Author: JR Raphael| Date: Wed, 20 Dec 2017 03:07:00 -0800

It’s an inevitable moment in the smartphone-owning cycle, the point at which a newer, shinier model comes along and your trusty old device is no longer needed.

Maybe your company bought you a new Android phone. Maybe your old one was getting too slow. Or maybe you just love electronics and couldn’t resist the lure of whatever sexy new Android device your favorite manufacturer started selling.

Whatever the case, it’s common nowadays to find yourself with an extra phone. And while there are plenty of practical uses for an old Android device, there’s also a time when the best choice is to sell, donate, or otherwise pass it along.                                                                            

To read this article in full, please click here

Read more

How to securely erase an iPhone in just 3 steps

Credit to Author: Michael deAgonia| Date: Wed, 20 Dec 2017 03:00:00 -0800

There are two main scenarios in which erasing an iPhone is called for: Either you’re getting a new phone, or the one you have is having problems.

The most common reason involves iPhone owners who trade up to newer models, usually in the fall after Apple unveils its latest line-up. Let’s say you buy the new iPhone X and then plan to trade in or sell your older iPhone 7; you’ll need to make sure your data is no longer present once the old phone leaves your possession.

To read this article in full, please click here

Read more

Why we can’t trust smartphones anymore

Credit to Author: Mike Elgan| Date: Sat, 25 Nov 2017 02:00:00 -0800

Your smartphone may contain secret “features” that leave you vulnerable.

I’m not talking about accidental design flaws that hackers might exploit. Security issues have always existed. They represent a cat-and-mouse game between malicious actors, who try to break smartphone security, and the smartphone industry, which tries to identify and fix the accidental vulnerabilities that make phones susceptible to hackers. Nothing new about that.

What I’m talking about is a new phenomenon — a trend we’ve learned about only in the past few weeks.

I’m talking about design decisions made by smartphone companies that cause phones to do things invisibly, behind the scenes and behind your back, that make phones potentially less secure.

To read this article in full, please click here

Read more

Mingis on Tech: The iPhone X – best phone for business, or best phone ever?

Credit to Author: Ken Mingis| Date: Thu, 09 Nov 2017 14:15:00 -0800

When it comes to mobile devices, companies tend to like three things: solid security, ease-of-management and low cost.

With Apple’s iPhone X, it looks like you can check off two of those three items. The phone’s cutting-edge Face ID authentication system really does work. iOS 11 is easy to manage and inherently secure. But that last one – price – is a big one. The iPhone X  starts at $999 for the 64GB model and goes to $1,149 for the 256GB version.

To read this article in full, please click here

Read more

Critics are wrong to slam iPhone X’s new face tech

Credit to Author: Mike Elgan| Date: Sat, 04 Nov 2017 03:00:00 -0700

Apple’s new iPhone X reads faces. And privacy pundits are gnashing their teeth over it.

The phone’s complex TrueDepth image system includes an infrared projector, which casts 30,000 invisible dots, and an infrared camera, which checks where in three-dimensional space those dots land. With a face in view, artificial intelligence on the phone figures out what’s going on with that face by processing locations of the dots.

Biometrics in general and face recognition in particular are touchy subjects among privacy campaigners. Unlike a password, you can’t change your fingerprints — or face.

Out of the box, the iPhone X’s face-reading system does three jobs: Face ID (security access), Animoji (avatars that mimic users’ facial expressions), and also something you might call “eye contact,” to figure out if the user is looking at the phone (to prevent sleep mode during active use).

To read this article in full or to leave a comment, please click here

Read more

What is Face ID? Apple’s new facial recognition tech explained

Credit to Author: Michael deAgonia| Date: Wed, 01 Nov 2017 02:57:00 -0700

With just a glance, Face ID can unlock Apple’s new iPhone X, giving owners a new authentication paradigm for the first time since the arrival of Touch ID with the iPhone 5. Face ID – that’s Apple’s name for the technology – uses a complex front-facing camera system and accompanying software to unlock the iPhone and authenticate purchases and payments with a mere glance.

The futuristic-seeming tech is one of the iPhone X’s main selling points, along with its “Super Retina” OLED screen, slimmer, bezel-less form factor and improved camera. But it also raises questions about whether the technology is as easy and secure to use as the tried-and-true fingerprint-based Touch ID.

To read this article in full or to leave a comment, please click here

Read more