US and British intelligence agencies hacked into a major manufacturer of SIM cards in order to steal codes that facilitate eavesdropping on mobiles, a US news website says. If you or I did that, we would be sent to jail. But, hey, these are government employees, right? They do not have to obey the laws that the rest of us must obey.
Mobile devices can track your Internet usage as well as the desktop systems do. You can block most (although not all) tracking rather simply. For Apple iOS (iPhone, iPad, and iPod Touch): Go to Settings —> Privacy —> Advertising and turn on Limit Ad Tracking. For Android devcies: Go to Settings —> Account —> choose Google account —> Ads, and turn on Opt out of interest-based ads.
I wrote about Verizon’s “Supercookies” or “Perma-Cookies” earlier at http://goo.gl/M3gNaU. When a Verizon customer visits from a mobile device, these supercookies allow third-party advertisers and websites to assemble a deep, permanent profile of visitors’ web browsing habits without their consent. I don’t like the idea of supercookies and apparently a lot of other people also do not. Those who question the practice of online tracking include several U.S. senators. The […]
If you unwittingly download malicious software, your computer and even your smartphone could be locked, unable to do anything. It’s called ransomware, a type of malicious code that leaves its victims feeling personally violated. Some versions destroy your data if you don’t pay, while others merely threaten. Some will encrypt your device, scrambling everything it contains until you pay a ransom. Some versions of ransomware display a fake FBI alert […]
When a Silent Circle subscriber makes a phone call, sends a text or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end from their iOS, Android or Windows PC device and is transmitted via Silent Circle’s crystal-clear, secure network. Silent Circle provides an encrypted communications service with easy-to-use tools available to all who appreciate a little control over who has access to their conversations. The […]
German researchers have uncovered a network privacy flaw in the mobile phone network used by almost every carrier on the planet that will let hackers intercept calls and text messages even on an encrypted line. The flaw was found on “SS7″ the global network the world’s networks use to route calls to one another. SS7 was designed in the 80’s and is being proven to have holes and flaws that […]
Wiper is not the only cell phone app that sends secure texts, photos, and and then deletes them from the recipient’s phone later. However, it is unusual that it also creates encrypted voice calls over wi-fi connections. Wiper is available free of charge for both Android and iOS (iPhone, iPad, and iPod Touch) devices. Most apps delete the messages a set time after they’re read, but Wiper lets you remove […]