All posts

2910 articles

Cloak and Dagger: A hole in Android

Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious actors can steal data including passwords; install applications with a full set of permissions; and monitor what the user is interacting with or typing on a keyboard on any Android smartphone or tablet. We repeat: This is not a drill…

Connected cars: Secure by design

According to Gartner’s prediction, a quarter billion connected cars will be on the road by 2020. That is why it is vital to implement the idea of information security right from the very start, at the stage of designing those connected cars.

Securing your ride

Modern cars are basically computers on wheels. The number of electronic components in vehicles has been increasing at a steady pace, and many models built in the past three to five years have a number of cameras, sensors, and radars on board, accompanied by hardware to process and analyze signals from all that equipment.

Fingers and eyes at MWC 2017

We’ve written about insecure fingerprint sensors and other biometric technologies a lot. We were not alone, of course. It looks like the fuss did some good. At Mobile World Congress (MWC) 2017 in Barcelona, many

Webcams vs. Humans

Recent news about IP cameras being hacked and private footage sold unlawfully online has bestirred the Internet yet again. Such headlines are now unsurprising; however, one new case has a sensitive twist: