More Featured Articles

Android Device Manager

Using Android Device Manager

Whether it's under the couch or in the hands of the bad guy, Android Device Manager will help you find or erase your missing phone While we hope you'll never need to use it, Android has a great native tool to help locate and remote wipe a lost or stolen phone. It's called Android Device Manager...
How to change your location settings in Android

How to change your location settings in Android

Sometimes it's best to hide your location in Android When you first set up your Android smartphone you'll be asked about location services, and whether you want the phone to use them. Google has its own services, and sometimes your carrier will have its own that you'll need to approve as well....
Security Phone

First smartphone 'kill switch' bill in the US passed by… Minnesota

The Governor of Minnesota signed a new bill into law that prohibits the sale of any smartphone without anti-theft software pre-installed. The idea is to deter criminals from stealing handsets in the first place by allowing users to remotely disable and wipe a phone's data, rendering it useless....

Photos

Security RSS Feed
Android password security

Security 101: Passwords

With so much of our lives online, secure p@$$w0rdz are a must Show of virtual hands — how many of us use the same password for everything and everywhere? I hope everyone said no, but I'm sure not everyone did. It's high time we talk about passwords, and why a smart and secure routine is in your...
New malware exploits USB, but isn't really that scary

'BadUSB' malware highlights the danger of plugging random mystery drives into your computer

Another day, another apocalyptic prognostication of computer security doom, this time focusing on the omnipresent USB connection. It's called 'BadUSB', and it's a malware proof-of-concept created by security researchers Karsten Nohl and Jakob Lell that exploits a flaw in and resides in the...
Android security

'Fake ID' and Android security [Updated]

'Fake ID' is an important find, but Google Play and Play Services updates mean many users are already protected Today security research firm BlueBox — the same company that uncovered the so-called Android "Master Key" vulnerability — has announced the discovery of a bug in the way Android...
Google Play purchases

How to keep your kids (or anyone else) from buying on your Google Play account

Passwords, passwords, passwords Have we mentioned lately the importance of using a password? Whether it's on your device itself, or any of your accounts, you've got to keep things behind a password. And that goes for making purchases from Google Play as well. A more recent bone of contention...
How to change your location settings in Android

How to change your location settings in Android

Sometimes it's best to hide your location in Android When you first set up your Android smartphone you'll be asked about location services, and whether you want the phone to use them. Google has its own services, and sometimes your carrier will have its own that you'll need to approve as well....
Managed apps in the launcher

Google gives a few details on the enterprise management tools coming in Android L

One of the less sexy but more important announcements at Google I/O last month was that Google is adopting part of Samsung's enterprise (as in corporate) security system into the L release of Android. The short version is that it'll be easier than ever to have your work data on your phone...
Blackphone

Blackphone fires back: 'BlackBerry betrayed its customers and jettisoned its credibility'

The folks working on the security-centric Android-powered Blackphone have posted a rebuttal to the criticisms made by BlackBerry recently. The piece focuses primarily on BlackBerry's poor market performance, dwindling stock price, and ultimate reliance on competing platforms. The main selling...
Security for Android

Google's Project Zero aims to make the internet a safer place

Google has announced a new security initiative called Project Zero, with the broad mandate of making the internet a more secure space. Full-time researchers will identify threats through the most widely-used applications, submit bug reports directly to the developers, and announce the changes...
London

UK government set to rush through emergency surveillance legislation

The UK government is looking to reinforce powers of security services to require internet and phone providers to maintain records of customer email and calls. Emergency laws are to be introduced into the Commons next Monday, following private talks and gaining support of both Labour and the...
Google Chrome

Investigation underway after Indian agency issues fake certificates to Google domains

The Indian Controller of Certifying Authorities (India CCA) has launched an investigation into the issue of unauthorized digital certificates to Google by the National Informatics Center Certifying Authority. Such a certificate could have been used to trick a service into thinking that a fake...

Pages