Are All Bug Bounties Created Equal? Hiring a professional exterminator can be a costly ordeal and typically requires multiple applications of strong chemicals in your home. They know their bugs and the chemicals and application techniques that are most effective. A typical exterminator treatment falls between $300 and $500 whereas, “cyber exterminators” are paid an average of $294 per reported bug submission… Read More »
Encryption is Perfect But iPhone Security is Not
I’m not writing this for the benefit of any criminals or would-be terrorists out there. There are many more law abiding citizens that value their 4th amendment and Bill of Rights right to privacy out there than there are spies, terrorists and criminals looking to exploit security flaws. Now that that disclaimer is out of the way,… Read More »
Black Hat Conference Highlights
Last week cyber security experts gathered at the Mandalay Bay hotel in Las Vegas for the 9th annual Black Hat conference. While the major media focus was on the connected car vulnerabilities I discussed in a previous post, there were many other important subjects covered. Let’s look at some of the highlights. Android Fingerprint Sensor… Read More »
Stagefright Bug Takes Center Stage On 950 Million Android Devices
A series of bugs and security loopholes in the Android operating system could allow hackers to take control of up to 95% of Android smartphones simply by sending an MMS message with malware attached. What is the Stagefright bug? Stagefright is the name of the Android operating system’s media library, which the bug is named… Read More »
Android & PC Tie For First Place In Malware
A report published last week by Alcatel-Lucent revealed malware on mobile devices has caught up to the infection rate on traditional PCs. The report was created by the telecommunications company’s Motive Security Labs and used data compiled from fixed and mobile networks using their Motive Security Guardian software. The software is deployed in networks around… Read More »
My Phone Is Held Hostage By Ransomware, Now What?
Ransomware is a type of malware that holds your data hostage. It has been a problem with computers for many years, but it’s only recently started showing up on mobile devices. When you activate the program or app, it blocks you from accessing the data on the device and displays a message demanding payment by… Read More »
Top 4 Security Drawbacks of BYOD
BYOD Security Concerns Many organizations have allowed or encouraged employees to use their own smartphones and tablets on the job. The process is called bring your own device, or BYOD. It’s popular with workers and saves the employer money on equipment costs. However, BYOD has drawbacks that concern security experts. Last week the Information Security… Read More »
Wiping Your Old Android Device Isn’t Enough
The average user’s upgrade cycle for smartphones and tablets is around two years. If the old device is still in good shape once the user upgrades, individual users and small businesses usually sell it or pass it along to someone else. Big companies send obsolete devices to companies that specialize in recycling end-of-life electronics.… Read More »