According to a report this week from Glenn Greenwald’s leak-happy publication The Intercept, new documents out of the Snowden archive suggest that the NSA and GCHQ have been actively hacking the world’s largest provider of SIM cards in order to eavesdrop on cellphones on a global scale.
Security consultant Mike Katz-Lacabe recently filed a request for records related to Stingray technology, which mimics a cellphone tower and exposes data from smartphones, used by the San Jose Police Department in a case.
The Iranian government has announced in a report that of the 23.5 million youth using the web in the country, 69.3 percent of them are relying on circumvention tools such as VPNs and proxies that provide access to the global web. The study has been publicized just a day after President Hassan Rouhani said existing Read More
In Ofcom’s recently published Communications Market Report, the British regulator revealed that people using Wi-Fi in public places give the least thought to their security. The report says that while 77 percent of people aren’t concerned about security when using public Wi-Fi, almost 75 percent of them said that they don’t restrict their online activity Read More
4G (fourth generation) network provides data access at super-fast speeds for mobile devices. The technology used for 4G makes it up to 100 times faster than 2G or 3G speeds. But according to some networking experts, this speed comes at the cost of security. 2G and 3G come with the robust feature of efficiently handling Read More
It was just over two weeks ago when WhatsApp crossed the threshold of 64 billion messages being transmitted in just a 24 hour time frame. This number is based on a total of 20 million sent, 44 million received messages through the WhatsApp app. In December of 2013, the company also reported over 400 million Read More
According to a report released today by security researcher Andreas Linh, many popular 3G and 4G USb modems used by telecoms such as AT&T and Verizon have been compromised to allow anyone with the keycode the opportunity to freely collect user credentials, passwords, and even the content of your computer’s hard drive all from over Read More
Ever since the rise of mobile devices as advertising platforms over the past five years, Google has had a bit of a problem on its hands. Instead of being able to rely on the old standard of cookies to track a web users surfing habits and usage history, they had to find a way to Read More
As our technology develops, more and more gadgets are also being introduced to the marketplace. We are now enjoying the best technologies that can make life a lot easier, and tablets are among of them. When tablets were first introduced, people immediately thought that it was an amazing gadget, but still many questioned its longevity. Read More
It’s pretty clear that mobile devices are already a huge part of our lives. Most of us have at least one smartphone. We use our smartphones every single day for communication purposes, for browsing the web or for playing all sorts of games. A smartphone is the first thing you pick up in the morning Read More