Topics
Content Types
About 14 results
-
Apple allows app developers to resume tracking with iOS 6
Apple was burnt once by allowing app developers to track users via the UDID. Will they get burnt again by allowing app developers to track using Apple's brand-new IDFA?
-
Carat: An Android app detects joule-draining bugs
Michael Kassner has an Android phone, and it's a battery hog. He has found an app that should minimize his angst.
-
How to find those permission-grabbing add-ons in Android
Ad networks are not the only add-ons we need to worry about. Michael Kassner test-drives an app that monitors all add-ons accessing Android permissions.
-
App spots hidden ad networks on Android phones
Who gets to use private information stored on your phone should be your choice. Michael Kassner found an app that makes it so.
-
Smartphone apps: They may be listening
Is your smartphone listening? It might. And, you may not even know it.
-
Research in Motion: Trying to have it both ways
Research in Motion has a problem. Their well-regarded encryption technology is upsetting national governments. Now, RIM has to make a choice; concede to the .govs or keep subscribe...
-
GSM encryption: No need to crack it, just turn it off
There are ways to get around GSM encryption, but the equipment has been expensive and difficult to get -- until now. Michael Kassner explores the latest Defcon breakthrough.
-
Public call to crack GSM encryption: Appropriate or not?
Full disclosure of IT security problems can be tricky, never quite pleasing all concerned parties. Maybe this time will be different.
-
Myth or not: Most security breaches originate internally
Are insider threats more prevalent than externally-initiated attacks? Michael Kassner doubts that it's true any more and explains why.
-
Twitter spoofing: The next logical exploit
First it was spoofing e-mail, then instant messages, and now spoofing Twitter is where it's at. Right now the ROI is good for attackers; let's try and change that.