Google releases a fix for the security hole that, if left unplugged, could allow attackers to run malicious code with no user interaction. Google has rolled out a security update to address a critical flaw in Android’s Bluetooth implementation that allows remote code execution without user interaction. The vulnerability, tracked as CVE-2020-0022, affects devices running Android … More Critical Bluetooth bug leaves Android users open to attack
A helmet may not be enough to keep you safe(r) while riding an e-scooter. Electric scooters are steadily becoming a popular alternative for short commutes. Besides convenience, however, they also introduce a range of cybersecurity and privacy risks, according to a study by the University of Texas at San Antonio (UTSA). The review – which UTSA said is “the … More Electric scooters vulnerable to remote hacks
From time to time, our readers raise questions or issues related to topics that concern, or simply interest them. One such issue was brought up recently by a Twitter user, who asked us: “Do you have any posts discussing the risk to banks when people use their cell phone inside them, ignoring the security guards?” … More What are the risks of allowing people to use their smartphone at the bank?
There is little doubt that smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable. But while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger target for cybercriminals. So why are … More 10 reasons why cybercriminals target smartphones
If there is one device that has captured the digital zeitgeist, it’s perhaps the smartphone. It has become such a constant that today, the average person will check their mobile 85 times a day. That seems like quite a high number, but when you consider how practical these devices are – for keeping in touch with … More A history of mobile malware from Cabir to SMS Thief