The capability is enabled by the recently introduced 2-Step Verification (2SV) method that allows users to protect accounts with a security key built into their Android phones. Previously, the technology could be used to verify sign-ins to Google and Google Cloud services on Bluetooth-enabled devices running Chrome OS, macOS, and Windows 10, and can now…

John Suffolk told a committee hearing that Huawei has sought guidance from its attorneys to see if a Chinese law on domestic companies’ cooperation with the government on security matters could force it to conduct foreign intelligence work. The legislation has been cited by US President Donald Trump’s administration in its attempts to force governments…

The probe, reported by De Volkskrant newspaper, comes as a series of western countries weigh the risks of allowing the Chinese telecoms giant to become involved in the new 5G mobile phone infrastructure. Volkskrant said the AIVD refused to confirm the report. AIVD spokesman Hilbert Bredemeijer declined to comment, saying the spy agency “does not…

The Federal Communications Commission said that because of China Mobile USA’s ownership and control by the Chinese government, allowing it into the US market “would raise substantial and serious national security and law enforcement risks.” The decision brings the Chinese telecoms giant’s eight-year effort to crack the US market to an end, but was not…

A strong majority of US adults value additional security measures for mobile transactions, with 90% reporting they would want the ability to approve some or all mobile device transactions before the transaction is completed, and 71% interested in approving all such transactions. One in five (19%) would prefer only to approve some transactions, such as…

RSA CONFERENCE 2019 – San Francisco – As more enterprise work takes place on mobile devices, more companies are feeling insecure about the security of their mobile fleet. That’s one of the big takeaways from Verizon’s “Mobile Security Index 2019,” released here this week. The report is based on responses from 671 enterprise IT professionals…

Videos and descriptions of the vulnerability have been making the rounds on social media websites. The attack does not require any technical knowledge and it can be carried out in seconds. The attacker calls the targeted user via FaceTime and then immediately initiates a group chat by using the “Add person” button from the bottom…

BlackBerry, which recently announced the acquisition of endpoint security firm Cylance for $1.4 billion in cash, says its Secure technology can be licensed by third-party vendors for their Internet-connected devices. The Secure feature packs provide manufacturers a framework that should help them build safer and more secure products without the need to internally develop cybersecurity…