Is SMS for two-factor authentication still secure, despite what NIST says?
While many in mobile security are focused on finding and detecting new malware, the problem of properly
securing mobile apps and the sensitive data they manipulate is rampant and still growing
A camera can be turned into a tool to be used against you – exposing you to surveillance by third parties.
Introduction One of the core designs of the Android operating system’s sandbox is to assign different applications a unique user identifier (UID). By doing this, Android reuses the underlying Linux kernel and filesystem properties to enforce boundaries. There are certain situations where apps may share the same UID, but that requires they be signed with
While an official proof of concept has not been released, NowSecure researchers have reviewed the available details and believe the Stagefright vulnerability is credible. The attack is based on the Stagefright library, which includes handling decoding of audio and video files and associated metadata. Patches are available but working through distribution channels. Until patches have
A security expert’s experience with an MIXC G7108 phone from China.