According to a report this week from Glenn Greenwald’s leak-happy publication The Intercept, new documents out of the Snowden archive suggest that the NSA and GCHQ have been actively hacking the world’s largest provider of SIM cards in order to eavesdrop on cellphones on a global scale.
Security consultant Mike Katz-Lacabe recently filed a request for records related to Stingray technology, which mimics a cellphone tower and exposes data from smartphones, used by the San Jose Police Department in a case.
Rogue cell towers spread across the US could be listening to your communications (calls, text messages, etc.), according to an investigation carried out by a security-conscious firm. ESD America is the firm behind the discovery. The company’s CryptoPhone 500, a modified version of Galaxy S3 featuring end-to-end encryption for protecting the baseband and the custom Read More
Recently we’ve seen two major changes made by Apple in China with the company now storing its user data on Chinese severs. It also banned the use of two harmful chemicals handled by factory workers during the assembly of iPads and iPhones. Apple said in a statement that it has stored data on Chinese servers Read More
In Ofcom’s recently published Communications Market Report, the British regulator revealed that people using Wi-Fi in public places give the least thought to their security. The report says that while 77 percent of people aren’t concerned about security when using public Wi-Fi, almost 75 percent of them said that they don’t restrict their online activity Read More
O2’s recent announcement of a No.10 tariff to bolster third party organizations comes shortly after the company became the first mobile operator to be awarded with CAS (T) – [secure and government approved network certification] in the United Kingdom. Now O2 and Vodafone are staking their claims as the best choice for government officials, who Read More
Internet connected cars are fun to drive, but they can have certain loopholes, making them fall prey to hackers. GM, Ford, Toyota, Tesla, and a few others have introduced a new generation of electric, Internet-enabled cars. These cars are largely known as safe, but are they really? Tesla owners recently received a wake-up call from Read More
4G (fourth generation) network provides data access at super-fast speeds for mobile devices. The technology used for 4G makes it up to 100 times faster than 2G or 3G speeds. But according to some networking experts, this speed comes at the cost of security. 2G and 3G come with the robust feature of efficiently handling Read More
According to a report released today by security researcher Andreas Linh, many popular 3G and 4G USb modems used by telecoms such as AT&T and Verizon have been compromised to allow anyone with the keycode the opportunity to freely collect user credentials, passwords, and even the content of your computer’s hard drive all from over Read More
Most mobile devices now come with an option to connect to the internet and transfer data through numerous web portals or apps. Increasing usage of iOS, Android and Windows platform has enabled network providers to offer various Hotspots in the form of Wi-Fi, 3G and 4G networks. There are multiple forms of data plans available Read More