A woman who tried to unlock a stolen iPhone unwittingly took her own photo. An application on the phone then automatically sent the photo to the owner, who called the police.
It's a good reminder that there are tools out there, either free or darn close to it, that can track your stolen or lost smartphone.
Companies using Samsung and Dell-branded printers are being warned that a hard coded administrative account could allow remote attackers to take control of their device, according to an alert from the US Computer Emergency Readiness Team (CERT).
Research released today has revealed that the theft of mobile phones is on the rise.
This isn't just about losing an expensive phone - there's also the threat of losing your data and money.
Learn how to better protect your phone.
A new Trojan is on the scene designed to steal your images and memory dumps. Are the thieves digging for dirt or stealing state secrets?
Organizations in the financial services and public administration sectors are the primary targets of sophisticated attacks aimed at stealing intellectual property, with attacks involving both external and internal agents and lasting for months or years, according to a new report from Verizon.
The town of Burlington, Washington has warned residents that they could be the targets of identity theft, after hackers compromised systems used to run an online automatic utility billing system and emptied $400,000 from a city bank account.
Researchers have created a malicious mobile phone application that uses phone and other sensors to create 3D visual maps of the owner’s home and other spaces.
A techie named David Schuetz has done something so obvious, so simple, and so tellingly useful, that I'm going to go all out and call it a stroke of genius.
He found the source of the "Anonymous FBI leak", and forced us all to find a whole new raft of conspiracy theories to go along with it...
Can you phish without a phishing page? Research by a student at the University of Oslo in Norway finds that, with the help of a trusty URI, ‘Yes, you can.’
SophosLabs has been tracking an increase in targeted attacks focused on hospitality and education organizations. The malware steals credit card data directly from memory for later retrieval by the criminals involved.
You've heard of hijacking. And carjacking, truckjacking and shipjacking. You've probably also heard of sidejacking, sheepjacking and clickjacking.
That's nothing. Here comes juicejacking!
This week's Chet Chat guest is Richard Wang. Richard and Chester spoke about Sony, bin Laden scams, LastPass, the upcoming Patch Tuesday and the recent rise in Apple Mac malware.
Sony disclosed today that the breach two weeks ago affects an additional 24.5 million users of its Sony Online Entertainment division. They have shut down the service until further notice and continue to investigate the thefts.
Tax refund scams have become commonplace. But this scam does it all differently. It asks for copies of your ID - a crazy-sounding request, yet one which we are increasingly accustomed to comply with.
We should learn to say no. Find out why.
German prosecutors are accusing two local hackers of breaking into the computers of over 50 pop stars, including Lady Gaga and Ke$ha.