With some handsets now costing over USD2,000, criminals are willing to use force to steal them.
Many phone screens have been replaced after the original was smashed. What if the new screen had already been compromised by criminals?
British users installed apps which collect and send data to the regulator, creating a new form of performance monitoring.
We can collect and share data to identify fraudsters but the same data can be used by fraudsters to target us.
Many vulnerabilities derived from SS7 can be exploited by mobile malware in order to abuse VoLTE.
The ability to create a substitute finger shows why even biometric controls need to be supplemented by other lines of defense.
When Apple introduced a “kill switch” that disabled stolen iPhones, there was a fall in crime in some cities, but not all.