Quantcast
Channel: Mobile Privacy
Browsing all 22 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Mobile Privacy – User Bill of Rights From EFF

Mobile smartphone apps represent a powerful technology that will only become more important in the years to come. But the unique advantages of the smartphone as a platform—a device that’s always on and...

View Article



Image may be NSFW.
Clik here to view.

Mobile Privacy, Security and Celebrities

There have been a number of recent stories with celebrities photos being leaked online, including Scarlet Johansson, Christine Hendricks, Olivia Munn and more. I was interviewed by Fox News regarding...

View Article

Image may be NSFW.
Clik here to view.

Privacy Invasion Lawsuit Names 18 Companies

Several companies have ben named in a class-action lawsuit as a result of mobile applications uploading contacts to servers without users’ consent. The mobile app developers who were following this...

View Article

Image may be NSFW.
Clik here to view.

You down with UDID? Yeah, you know me… my location and app activities

It was announced this week by the hacker group AntiSec that they compromised a laptop belonging to Supervisor Special Agent Christopher K. Stangl from the FBI taking advantage of vulnerability in Java...

View Article

Image may be NSFW.
Clik here to view.

Anonymous vs GoDaddy: Social Media As Social Engineering

When GoDaddy’s services went down last week there was instantly speculation that Anonymous had something to do with it. The fact that the group has been responsible for a number of high profile hacks...

View Article


Ignite Portland 11: Pwnd By Devices

My Ignite Portland presentation “Pwnd By Devices”…had a blast doing this, even though it was freaking hard:

View Article

Image may be NSFW.
Clik here to view.

Mobile Penetration Testing: There’s An App For That

Introduction Getting Inside The Phone Setup USB Hacks Network & Vulnerability Scanners Session Hi-Jacking & ARP Spoofing Wi-Fi Sniffing Remote Access Remote Shell & Scripting When most...

View Article

Image may be NSFW.
Clik here to view.

Vice.com Publishes Exclusive with John McAfee Reveals Location In iPhone...

Update: It looks like McAfee really is in Guataemala and has hired an attorney in the country. ( looks like our friends at Vice.com learned a lesson, they removed the EXIF data ) Vice.com published an...

View Article


ToorCamp 2012 – Tracking Technology, Forensics and Privacy

My presentation from this summer at ToorCamp, probably the most fun you can possibly have at a security conference. I learned tons.

View Article


Senate Cyberstalking Bill To Close Privacy Loophole

Today the Senate Judiciary Committee is set to approve legislation sponsored by sponsored by Sen. Al Franken, D-Minn. that would block a loophole for “cyberstalking apps”. The purpose of the bill is to...

View Article

Digital Privacy Isn’t Taken, It Is Given Away

Open Source Data & Surveillance With the Edward Snowden privacy leak there is an important factor that is being missed. It isn’t the government agencies that collect the data, they are merely...

View Article

Case Study: Metadata Used to Track Craigslist Theft & Assault

We have been hearing a lot about metadata the last few months thanks to the ongoing revealing of NSA tactics and partnerships. Many have stated it is only “metadata” however there is a lot more to...

View Article

Prodigy/Telmex E-Mail Vulnerabilities Exposes Thousands of Accounts and Puts...

Over the past few weeks I have been working with  El Economista on the discovery and disclosure of a massive security hole in Prodigy’s  (Telmex) mobile email and web based mail systems in Mexico. The...

View Article


Risks of “Cutting the Cord”: Home Security, Thieves & Cell Phone Jammers

I hear a lot about people “cutting the cord” stating they are free from their wired line and more disturbing is the fact they brag about this online via social media to the public. This puts people at...

View Article

Image may be NSFW.
Clik here to view.

Digital Privacy Isn’t Taken, It Is Given Away

Open Source Data & Surveillance With the Edward Snowden privacy leak a few years back, there is an important factor we’re all missing. It isn’t the government agencies that collect the data. They...

View Article


Image may be NSFW.
Clik here to view.

Vice.com John McAfee Exclusive Reveals His Location in iPhone EXIF Data

Some time ago, the website Vice.com posted an article with the somewhat full of themselves title “We Are With John McAfee Right Now, Suckers”. In it, they reveal how they have been traveling with John...

View Article

Image may be NSFW.
Clik here to view.

Sony PSN Data Breach – Plain Text vs. Hashed Passwords Explained

There has been a rash of data breaches where passwords are compromised that were stored as plain text and not converted to a one-way hash as they should be. However, most consumers and even many...

View Article


Image may be NSFW.
Clik here to view.

How Your IP Address Can Be Used to Track You

IP (Internet Protocol) is a framework that governs activity by enabling 2-way communication on the internet. It does this by assigning unique protocol addresses to every device connected to the web....

View Article

Image may be NSFW.
Clik here to view.

Top Benefits of Using a VPN in the UK

VPN technology has become very popular lately in the United Kingdom. It provides security when using any network, especially when sending encrypted data. If you’re interested in using a virtual private...

View Article

How Does a VPN Keep Your Data Transfers Safe

Do you transfer data either for work or personal purposes? If you haven’t experienced any problems yet, then consider yourself lucky. There’s no question that the Internet has made our lives easier in...

View Article
Browsing all 22 articles
Browse latest View live




Latest Images