A recent CNet.com article reports that “At its I/O conference, two of Google’s top-level security experts, the director of security for Google Apps, and the head of Chrome security; say the company is intensely focused on the issue, but passwords remain a thorny problem.” The “company”, Google, being intensely focused on security; in my opinion, remains to be seen. However, they stated “Unfortunately the human is often the weakest link in security.”
What a smoke screen! Instead of owning up to royally missing the boat on Google apps for the Android available through Google Play store, they talk about Continue reading
A Net-Security.org article states that Android malware continues to rise. F-Secure Labs reports that a new method of distribution of malware to Google Android smartphones has surfaced in the first quarter of 2013—email spam. There appears to be movement from app-based malware to email spam as the method of infecting Android phones. Continue reading
A recent BusinessInsider.com article announced that the Facebook app for Android Smartphones can change your audio settings, record audio, and take pictures and videos at any time and without your confirmation. Sounds like fun, huh? Especially since there is already malware that can take control of Android phones, Continue reading
The US Department of Defense announced recently that it has approved the use of Samsung phones running a “hardened” version of Android. Android!! The smartphone operating system that has been the target of hackers since it’s inception! The same one that has been plagued with malware-laden applications from Google Play App Store! Continue reading
A flaw in an Android app, found by security firm Bkav Internet Security, will allow hackers to take complete control of an Android smartphone using the app Viber, an app claiming to allow free phone calls and free messaging to another phone using Viber. Here’s a quote from their Internet website: Continue reading
What is two-step verification (or authorization), and why are WordPress, Google, Microsoft, Dropbox and others proposing we use it?
Two-step verification (or authorization) is a security tool to protect your Internet accounts from being compromised even if your password is stolen. Continue reading