An anonymous reader quotes a report from The Verge: A recent patent application (PDF) shows that Samsung has ambitious ideas for future phone-design experimentation, although the South Korean manufacturer may have second thoughts about bendy phones after recent battery explosions…

iOS WebView Problem Allows Attackers to Initiate Phone Calls
An issue in iOS WebView that is trivial to exploit can give an attacker the ability to trigger phone calls from a targeted device, researcher Collin Mulliner said.

Google to Red Flag ‘Repeat Offender’ Websites
Google’s Safe Browsing program expands to include “Repeat Offender” websites in blacklisting program.

Locky Targets OPM Breach Victims
A phishing campaign is targeting some of the 22 million victims of the massive United States Office of Personnel Management breaches of 2014 and 2015.

CEO Fraud
CEO Fraud is a type of targeted attack. It commonly involves a cyber criminally pretending to be your boss, then tricking or fooling you into sending the criminal highly sensitive information or initiating a wire transfer. Be highly suspicious of…

Unique Passwords
Make sure each of your accounts has a separate, unique password. Can’t remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.

Don't Lose That Device
Did you know that according to the Verizon DBIR team, you are 16 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling, always double-check to make sure you have your mobile…

Use Caution Opening Email Attachments
A common method cyber criminals use to hack into people’s computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only…

Who needs a Stingray when Wi-Fi can do the job?
Ordinary Wi-Fi hotspots can be used to extract indentifiers from your cellphone, researchers have found

Microsoft to shield world chess champion from Russian hackers
Leading up to Friday’s world championship, he asked for help in keeping months of computer-intensive analysis and preparations safe.