A skilled hacker has shown how to hijack a smartphone via a short-range radio technology known as Near Field Communication (NFC).
Charlie Miller created tools that forced phones to visit websites seeded with attack software.
The software on the booby-trapped websites helped Mr Miller look at and steal data held on a handset.
NFC is becoming increasingly common in smartphones as the gadgets are used as electronic tickets and digital wallets.
CYBER operations units will soon sit alongside the army, navy and air force as a major wing of Australia's defence forces, an online security expert says.
And remote controlled robots - similar to drones being used by the US in the air now - will be an increasing part of ground combat, says Queensland University of Technology’s Bill Caelli.
In the US, authorities have already agreed to sponsor courses for cyber operation experts trained in limiting an enemy’s ability to attack and Prof Caelli says this will follow here.
Cyberwarzone is going crazy and has decided to post a massive top 100 security tips for the community. These tips can be used on a daily basis and are easy to implement. The security tips will help you protect yourself against potential threats.
The tips will cover topics like web surfing and doing it secured. As the list gets bigger the topics could get complex. Feel free to share this blog and don't forget to tweet about it.
The Trojan called Andr / Kongfu-L is back on mobile devices. It is hidden in the depths of a version of Angry Birds Space available on the unofficial market applications.
The wave Angry Birds gives ideas to hackers, Who use it as a vector for the spread of malware on Android smartphones .
Cans, Sophos security expert and author of an investigation into the matter, and relays the warning prompt potential victims to shift from third-party software parks, teeming such threats.
A leading European cybersecurity expert says international action is needed to prevent a catastrophic cyberwar and cyberterrorism.
Eugene Kaspersky, chief executive officer co-founder of Kaspersky Lab -- which says it is the largest antivirus company in Europe -- made the remarks Friday at the World Cyber Security Technology Research Summit at Queen's University Belfast.
Just as US companies are coming to grips with threats to their computer networks emanating from cyber-spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones.
Dmitri Alperovitch, the former McAfee cyber security researcher best known for identifying a widespread China-based cyber-espionage operation dubbed Shady Rat, has used a previously unknown hole in smartphone browsers to plant China-based malware that can commandeer the device, record its calls, pinpoint its location and access user texts and emails.
In Russia most of the cell phone SIM cards are prepaid cards. One of the Russian operators offers a legal service that allows SIM prepaid users to transfer the prepaid money to a bank account.
This particular service is misused by cyber criminals. Cybercriminals are using the service to obtain money. Denis Maslennikov has provided a podcast about cell phone money laundering.
3 popular types of cell phones replenishing