Search
Close this search box.

On the Wire Podcast: Roger Anderson

Roger Anderson is a self-proclaimed phone geek, the kind of guy who loves getting into the guts of a telco network and figuring out how it works. So when he decided that he’d had enough calls from telemarketers and robocallers, he didn’t cancel his landline, he built the Jolly Roger Telephone Company, a bot that […]

‘This is Not a Case About One Isolated iPhone’

Apple’s lawyers say that not only does the compromised operating system that the FBI wants to install on the iPhone used by a terrorist not exist, but that it would take between six and 10 engineers and other employees as long as a month to create it. That fact, the company argues, along with a […]

Cook: ‘This is Not What Should Be Happening in This Country’

As the deadline for Apple to respond to a court order to help the FBI unlock an iPhone, both sides are upping the level of their rhetoric, with Apple CEO Tim Cook saying “this is not what should be happening in this country.” In an interview Wednesday, Cook said that the company has refused to do […]

Acecard Android Malware Attacks Bank Apps

As more consumers and businesses have moved to mobile as their main platform for banking, attackers have taken notice and followed suit. The number of mobile banking Trojans increases every day, but some are more sophisticated than others, and researchers have discovered new variants in an old Android malware family that can attack more than […]

Rep. Lieu Asks Comey to Drop FBI’s Demands on Apple

Rep. Ted Lieu has sent a letter to FBI Director James Comey asking the bureau to drop its legal efforts to force Apple to circumvent its own security measures so the FBI can access data on an iPhone used by one of the shooters in the San Bernardino massacre. Lieu (D-Calif.), who has a background […]

The Selfie is the New Payment Biometric

Banks, credit card companies, and other financial companies are turning over every rock in an effort to fight fraud, including trying out novel authentication techniques. The latest move in this area is toward facial recognition via smartphones as a way to ensure the person making a purchase is who he claims to be. After decades […]

What We Know So Far: Apple and the FBI

The public back-and-forth between the FBI and Apple over the company’s refusal to create a custom version of iOS that would let the FBI access encrypted data on an iPhone belonging to one of the shooters in the San Bernardino massacre has produced a huge amount of rhetoric and confusion. The technical details of what […]

Phone Scam Breakdown: Google Listings Scam

The first step in protecting against phone scams is understanding how they work. That’s why in this series, we’re breaking down some of the newest and most popular phone scams circulating among businesses and consumers. The Scam You’re a small business owner running a website through a popular hosting site. You have purchased the unique […]

Xbot Android Ransomware Can Steal Bank Info, Encrypt Devices

There’s a new Android Trojan circulating that has the ability to not only steal victims’ banking credentials and texts from banks, but also can lock infected devices, encrypt their contents, and hold them for ransom. The Xbot malware is part of the growing sector of mobile ransomware, a threat that has plagued desktops for years. […]