mobiles

5G risk assessment

Posted on

5G is on the way, but there’s no reason to start running around with your pants on your head just yet. While there will be a lot of hoopla about 5G in the CBD area of major cities there is a very large infrastructure network that will have to be put in place. Think at […]

anonymity

The Spycraft Revolution

Posted on

The world of espionage is facing tremendous technological, political, legal, social, and commercial changes. The biggest disruptive force is technological. Traditional spycraft has always relied on deception based on identity. Spotting, developing, recruiting, running, and servicing intelligence sources involves concealing what you are doing.  Not anymore. A cover identity that would have been almost bulletproof […]

mobiles

Check Your Android VPN

Posted on

Granting permissions to apps takes a certain level of trust—trust that an app is honest about the parts of your phone’s hardware and operating system it has access to, and what it does with the data therein. Trust is especially crucial with VPN apps, the point of which is to obfuscate your mobile internet activity from unwanted […]

mobiles

Phone Hacking Fears and Facts

Posted on

The lack of security built into phone networks leaves callers vulnerable to snooping, but the growth of encrypted communications will help protect privacy. Apple’s ongoing standoff with the government over passcode-protected iPhones is still raising unprecedented alarms over smartphone security and privacy.  The good news: Although the SS7 system will indeed work for spying on […]

mobiles

Clone A Phone

Posted on

It might surprise you, but there are plenty of ways to learn how to clone a phone without touching it. It doesn’t matter if you wish to clone an Android, Windows, or an iOS device – you can easily clone the target phone and obtain crucial information related to it. By exploiting some vulnerability on […]

mobiles

Using Android Without Google

Posted on

As soon as you start up a new Android phone, you get prompted to sign in with your Google account — but what if you don’t want to do that? Maybe you want to take advantage of Android but limit what Google knows about you, or maybe you just prefer the alternative apps; whatever the case, […]

mobiles

My phone is spying on me

Posted on

If your phone is turned on and has signal, it can be communicating — whether you’ve asked it to or not — with a wide variety of companies, many of which you won’t have any direct relationship with. And yes, this can happen even when you’re not using it. Your phone and other personal computing […]

mobiles

Librem 5 Linux Phone Delayed until April 2019

Posted on

Promising to offer users unprecedented control and security features that aren’t available on any mainstream smartphone out there, the Librem 5 device was supposed to hit the streets in early January 2019, but the company informs Softpedia that they decided to delay the initial shipping of the smartphone due to some issues affecting the device’s […]

mobiles

The Problem with Mobile Phones

Posted on

This article, although 3 years old, is still very relevant today. Basic tradecraft doesn’t change, and it’s the little things that you take for granted that will mess you up. Merely swapping SIM cards or moving a SIM card from one device to another offers minimal protection, because the mobile network observes both the SIM […]