Attacks on wireless chargers: how to “fry” a smartphone
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
78 articles
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
A fresh study of some unexpected properties of a standard feature of all modern smartphones and tablets.
Android 13 and 14 have a feature called Restricted Settings. We explain its purpose, and how malicious applications bypass it.
The three most dangerous Android features that make your smartphone much more vulnerable to malware.
Android fingerprint protection isn’t that reliable after all: it can be brute-forced even without a copy of your fingerprint.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Could someone be viewing your private photos while your device is being repaired?
In a new study, security experts explore eavesdropping on phone conversations through a bug inside almost every smartphone. How dangerous is it?
In the past year, a slew of cases in which criminals used AirTags to stalk people have come to light. We explain how this works and how to protect yourself.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
How to set app permissions in iOS 15 for maximum privacy and security.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Create a digital comfort zone using any old tablets, laptops, and modems you have on hand to work from home safely.
You can refuse some permissions to greedy games, and they most definitely do not need these five.
Researchers found a way to create fake fingerprints to fool many devices, although it took a lot of effort.
Smartphones are always covered in bacteria, but viruses can also survive there, including COVID-19. We explain how to properly disinfect your smartphone.
Considering buying a smartphone for your kid? Here are the pros and cons, and how to choose a device.
How paranoid employers and jealous partners can spy on you, and why chip bags are best left to movie heroes.
There’s no malware in the official Android store, right? We get to the bottom of this claim.
Some say you can get malware on your iPhone simply by visiting a dangerous Web page. We examine the rumor to get at the truth.
Many swear phones secretly listen in through their built-in microphones. We investigate the claims — and offer other explanations for spookily precise mobile ads.