WhatsApp security flaw should be a quick fix for Facebook

Worried that someone might be eavesdropping on your WhatsApp chats? Facebook might just have the solution. Earlier today, we reported on a security issue involving the Android version of mobile messenger WhatsApp. The vulnerability, discovered by security researcher Bas Bosschert, basically involves extracting the app’s SQLite database from the phone’s microSD storage, which is usually accessible

The Internet of Things: Will our devices spy on us?

We earlier reported on Google’s acquisition of Nest for $3.2 billion. Nest, which creates thermostats that automatically adjust temperature based on a user’s proximity, interfaces with devices like smartphones and via the web. Nest also has proximity sensors that can sense whether there is someone about, and will adjust the heat accordingly. Three billion is

Apps and permissions: Is Facebook Messenger spying on us?

Google Play’s app permission system is meant to inform users of how far into our data and device an application will be able to access before we install an app, or before updating an app with revised permissions. But most users are not likely to bother reading the entire thing, which means we may already

Here’s how the NSA can listen in on your conversations

Earlier this year, NSA whistleblower Edward Snowden gave us a peek into how far-reaching the agency’s digital spying activities are. US and foreign citizens alike decried how the NSA’s PRISM program can hone in on supposed enemies of the state and pick up relevant conversations — all in the name of national security, of course.

Privacy vs. connectivity: Can there be a balance?

Vint Cerf, one of the fathers of the Internet, has said that privacy may actually be “an anomaly.” He says this in the context of an increasingly connected world. We now take things like instant messaging, email and social networking for granted, when only a few decades ago many households relied on public-switch telephone networks

The smartphone kill switch: Pros and cons

Have you ever lost a mobile phone? Or, worse, have you had a mobile phone stolen from you? I have experienced being pick-pocketed firsthand, although I was able to recover the device later on. It wasn’t a pleasant experience, and I made sure to better secure my devices from that point on. With tracking apps

Apple’s TouchID Hacked – The Sky is Falling!

The Chaos Computer Club has claimed to have hacked Apple’s TouchID. “The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple’s TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock

Fake BBM for Android apps

Fake BBM for Android apps flood Google Play

Plenty of fake BBM for Android apps are now on Google Play. A search for “BBM” on Google Play currently yields the following results: BBM for Android by Mobile Freakz, BBM Messenger for Android by Blackberry BBM Messenger, Messenger for Android by Messenger for Android, BBM Messenger Free by Blackberry BBM Messenger, BBM Messenger Pro

android device manager

Web interface of Android Device Manager now available

The Android Device Manager has finally gone public, helping users track or remotely wipe their device using nothing but a web browser. However, it seems like this service is being gradually rolled out around the world, so don’t be surprised if you aren’t able to track your device as of now. Google is yet to

Secure Cloud Storage for Android

Image Source: Open Data Space How secure are your files on the cloud? Ever since you first dialed up to the Internet on your modem, the files and information you kept on your personal computer became a little less secure. These days computing devices are connected to the Internet 24/7, our mail and duplicate copies

FortressFone claims to be an anti-hacking smartphone

A new device called the FortressFone promises to keep your private data from being accessed by unauthorized persons. It is a timely solution to the growing concern caused by recent security-related issues. FortressFone is described as an 256-bit AES encrypted device using professional-grade standards defined by the NSA. It is based on the Samsung Galaxy

This Android security bug is affecting 99% of the users

A security researchers firm named Bluebox Labs has uncovered a new security loophole in Android which allows third party developers to inject malicious content to a smartphone, without the consent of the owner. What makes this even hard to block is the fact that it can make its way to the system disguised in the