How Huawei and ZTE could prove their phones aren’t spying on U.S. customers

February 16, 2018

Huawei can’t get any U.S. carriers to sell its phones instantly to patrons . Image: BRIDGET BENNETT/ MASHABLE Huawei, the second-largest phone maker in the world, must be free to do something rapid if it ever wants to gain a foothold in the U.S. and potentially grow the world’s largest telephone producer one day. The Chinese company can’t get U.S. carriers to sell its telephones. And now the heads of…

Read More >>

Mind the Gap: This Researcher Steals Data With Noise, Light, and Magnets

February 10, 2018

The field of cybersecurity is preoccupied with preventing and detecting breaches, find every possible approach to keep intruders from infiltrating your digital internal sanctum. But Mordechai Guri has spent the last four years fixated instead on exfiltration: How snoops pull information out once they’ve gotten in. Specifically, he focuses on plagiarizing mysteries sensitive enough to be stored on an air-gapped computer, one that’s unplugged from all networks and sometimes even…

Read More >>

Android Users: To Avoid Malware, Try the F-Droid App Store

January 22, 2018

In the early days of Android, co-founder Andy Rubin set the stage for the newcomer mobile operating system. Android’s mission was to create smarter mobile inventions, ones that were more aware of their owner’s demeanor and location.“If beings are smart, ” Rubin told Business Week in 2003, “that information starts coming aggregated into consumer products.” A decade and a half afterward, this objective has become a reality: Android-powered gadgets are…

Read More >>

A New Way to Track Down Bugs Could Help Save IoT

January 19, 2018

On a clear day this summer, security researcher Ang Cui boarded a boat headed to a government biosafety facility off the northeastern tip of Long Island. Cui's security company, Red Balloon, will spend the next year studying how its Internet of Things threat-scanning tool performs on the building control systems of Plum Island Animal Disease Center. If successful, the project could provide a critical tool in the fight against vulnerabilities…

Read More >>

This solar-powered smart deadbolt will soon use Alexa, Google Assistant, and Siri

January 14, 2018

A front opening outfitted with an ARRAY Smart Deadbolt . Image: edges The Internet of Things is proceeding dark-green. Brinks( a subdivision of equipment producer Hampton Produce) has announced that it is taking preorders for its ARRAY Smart Deadbolt, a heavy-duty lock you can operate with your smartphone. SEE ALSO: This smart deadbolt employs Google Assistant to keep you safe Unlike numerous smart locks, however, which require standard cylindrical batteries,…

Read More >>

Phones with in-display fingerprint scanners are pretty damn great

January 12, 2018

This Vivo phone has a fingerprint sensor built right into the display.Image: raymond wong/mashable With the move to edge-to-edge screens and narrower bezels, there’s just no room to put a fingerprint sensor on the front of a phone anymore. Phone makers have moved them to the side or back, or removed them entirely.  But things don’t have to be this way. At CES 2018, Chinese phone maker Vivo showed off…

Read More >>

How to Rip the Mics Out of Your MacBook and iPhone

December 11, 2017

Any self-respecting paranoiac long ago taped over the webcam on their laptop—and for good measure, the cameras on their smartphone too. But for those truly concerned that their computers have been hacked and turned into spy tools, the microphones on those devices represent just as much of a security threat as the cameras. They would allow a hacked gadget to bug an entire room. The good news for the targets…

Read More >>

How to Sweep For Bugs and Hidden Cameras

December 11, 2017

If you're facing targeted security threats, your problems run deeper than spyware on your devices. You need to check your physical spaces as well—your home, hotel room, office, and so on—for hidden cameras, mics, and other eavesdropping tools that someone may have planted. That means performing regular "technical surveillance counter measures" inspections. In other words? Checking for bugs. "Hackers bug lots of places, including some people wouldn’t think of," says…

Read More >>

A Tiny New Chip Could Secure the Next Generation of IoT

December 10, 2017

The Internet of Things security crisis persists, as billions of inadequately stuck webcams, refrigerators, and more spate residences around the world. But IoT security researchers at Microsoft Research have their see on an even larger trouble: the thousands of millions of devices that are currently run on simple microcontrollers–small, low-power computers on a single chip–that will gradually amplification connectivity over the years, exponentially expanding the internet of things population. And…

Read More >>

Just a Pair of These $11 Radio Gadgets Can Steal a Car

December 6, 2017

For years, automakers and hackers have known about a clever attack that spoofs the signal from a wireless car key fob to open a vehicle's doors, and even drive it away. But even after repeated demonstrations—and real thefts—the technique still works on a number of models. Now a team of Chinese researchers has not only demonstrated the attack again but also made it cheaper and easier than ever. A group…

Read More >>