Tag: Mobile
You are here: Home \ Mobile \ Page 2
24 September 2015 - 10:49, by , in News, No comments
Many teens consider online bullying to be worse than face-to-face bullying, a survey of teenagers has found. After all, cyberbullying can happen around the clock, it’s relentless, and it’s driven by crowd behaviour – in fact, you can consider it a horrible manifestation of crowd-sourcing. The survey of 4720 teenagers around the world found that...
21 September 2015 - 11:43, by , in News, No comments
Ads are larger and harder to dismiss on mobile, they slow down page loading with JavaScript, that in turn leads to burned battery power, they waste the cellular data that many of us have to pay for on a metered basis – and they can be used to deliver malware, exploits and fraud. How does...
18 September 2015 - 12:59, by , in News, No comments
Apple’s week has been a bit of a curate’s egg. If you’re unfamiliar with that metaphor, it’s a Victorian joke in which a curate, a cleric on the bottom rung of the Church of England hierarchy, is invited to breakfast with the Bishop. When the Bishop apologises that the curate seems to have been served...
18 September 2015 - 11:01, by , in News, No comments
Google pushed out its first-ever monthly security update for Android in August, fixing the Stagefright vulnerability that an attacker could use to own your device with a malicious MMS message. Nexus devices got their September security update last week, fixing another eight vulnerabilities, including one that could allow an attacker to bypass the lockscreen and access...
15 September 2015 - 11:11, by , in News, No comments
Researchers have shown that a smartwatch’s motion sensors can be used to detect what keys you’re pressing with your left hand (or whatever hand the watch is on) and thus guess at the words you’re typing. Their findings suggest that it’s possible for cybercrooks to come up with an app that camouflages itself – for...
29 July 2015 - 12:39, by , in Vulnerabilities, No comments
Zimperium zLabs has discovered a flaw in the android operating system that allows the device to be compromised simply by sending it malware infected media via MMS Users don’t necessarily need to open the message for the code to run either, which is one of the worst parts of this vulnerability. The researchers also say...