361Security
  • Intelligence
    • Blogs >
      • Paul Ashley
      • Brandon Scott >
        • Book
      • Haqmal
    • Analysis
    • Regions >
      • Global
      • Africa >
        • Kenya
        • Nigeria
        • Somalia
      • Asia >
        • Afghanistan
        • Myanmar (Burma)
        • India
        • North Korea
        • Pakistan
      • Europe >
        • Russia
      • Latin America >
        • Brazil
        • Colombia
        • El Salvador
        • Honduras
        • Mexico
        • Venezuela
      • Middle East >
        • Iran
        • Iraq
        • Jordan
        • Kuwait
        • Lebanon
        • Libya
        • Saudi Arabia
        • Syria
        • Turkey
        • Yemen
    • 'The First 300' Project
  • Services
    • US Government Services
    • Jobs Portal >
      • Leads
    • Shop
    • External Links
    • Consulting
    • Human Security
    • Development Nexus
    • Request For Information
    • Market Security
    • Key Leader Dossiers
    • Information Security
    • Literature Reviews
    • Cultural Intelligence
    • Research Resources
    • Forums (Beta)
    • Files
    • Security & Stability
    • Terrorist Profiles
  • Communications
    • About
    • Advertising
    • Public Affairs
    • Contributors >
      • Zachary Alpert
      • Paul Ashley
      • Michael Bassett
      • Ben Eden
      • Jeffrey Hawn
      • Nick Heras
      • Attila Laczko
      • Brandon Scott
      • Chris VanKirk
    • Mailing List

Cyber security expert finds new flaw in smartphones

2/25/2012

 
A former McAfee researcher has used a previously unknown hole in smartphone browsers to plant China-based malware that can record calls, pinpoint locations and access user texts and emails.

Comments are closed.

    Cyber Security

    Never before in history has there been a more complex form of warfare than Cyberwarfare. The cyber battlefield is an ever evolving and seemingly insurmountable obstacle. At 361Security we have dedicated this section to writings from IT professionals from the US and European defense communities. They have volunteered to offer 361 and its readers a professional approach to current and future Cyber threats. Additionally we will provide ample updates to others writings.

    Archives

    May 2012
    March 2012
    February 2012

    Categories

    All

© 2011 - 2024