Malware Growth for Apple iOS Outnumbers Android’s

Android devices across the world far outsell Apple devices; despite so hackers seek to attack iOS devices. Indeed, with Cisco Systems and IBM partnering with Apple for providing business associated services intended for corporate users, it’s expected that iOS devices will more-and-more become targets of malicious software. As a proof,…

read more

Apple iOS 10.3.3 Has A Great Secret Feature

Apple iOS 10.3.3 has problems but what appears to be an otherwise dull update on the surface, actually hides a crucial improvement (but bad news for older iPhones) if you delve deeper… ‘Great Secret Features’ and ‘Nasty Surprises’ are my regular columns investigating operating system updates for the best features…

read more

Declutter your phone to avoid security threats

Regularly downloading the latest trending apps on your smartphone may be the reason you often struggle with freeing up memory space on your phone. From addictive games and social media apps, to online shopping and photo editing apps, your downloads and growing interests can digitally clutter your phone in a…

read more

Border Force uses publicly available phone hacking tools used by crooks, techs

Major Australian government agencies, including the Department of Immigration, are buying off-the-shelf phone hacking tools that can extract data from mobile phones, according to a UK-based vendor. Fairfax Media revealed in June various government departments and agencies, including Centrelink, the Department of Employment and the ATO were using phone-hacking technology…

read more

App thwarts voice hackers using phone’s compass

The ability to control our gadgets with voice commands brings a lot of convenience, but it also brings something else: the opportunity for voice hacking. By using recordings of our voices, hackers could gain access to our phones or any other device featuring voice recognition software. Researchers at the University…

read more

Hacking The Galaxy S8 Iris Scanner

Three every-day items hold key to smartphone hack. Just when you think researchers have finally come up with a foolproof security scan method (and what could possibly be more secure than the eyes in your skull?) some fancy hackers have to go and prove it can be beaten. Even worse,…

read more

The need for internet security on your mobile

Cybercriminals are constantly making advancements and finding new ways to compromise us. While they still target computers, hackers are also beginning to attack mobile devices. We are starting to see more threats such as ransomware attacks on smartphones. As hackers target mobile devices, it’s imperative to ensure that you are…

read more