2012 signified the year where people started seriously thinking about mobile security and asking: how do we handle this new threat? The question was not merely one asked by uber-defense agencies (think back to Obama’s…
Read MoreA new vulnerability exploiting Android devices was published just yesterday. The vulnerability- aka ExynosAbuse – exists on various Samsung devices on a number of Android versions, including 2.x, 4.0, and 4.1. The flaw is a…
Read MoreJust recently high-ranking Georgian officials were accused of hacking into their political opponents’ computers and phone call tapping – recordings that were later uploaded to YouTube. With the prevalence of mobile phones, phone call tapping…
Read MoreFollowing our last blog entry, we were inundated by personal requests asking us: How do iOS devices (iPhone, iPod) become infected with spyphone malware? And more pressing, how to prevent a spyphone installation? How are…
Read MoreAt Lacoon Security we sleep, breathe and live mobile security. But one question we keep receiving is whether iPhones are in fact hack-proof. After all, when you hear about malicious apps – such as those…
Read More