Enpass upgrades to version 5 with full-time fingerprint support and autofill

enpass_app_icon

With security in the headlines the past couple days, users may once again be considering methods and apps to help secure their logins. Password managers are increasingly getting attention from consumers, especially as they continue to add features making them easier to use and more functional. One of the apps that made our list of the best password managers this year, Enpass, has announced a major upgrade to their platform to version 5.0 that brings two key improvements.

Sundar Pichai sides with Tim Cook’s encryption stance on Twitter

google-sundar-pichai-MWC-2015_MVNO

In case you haven’t seen it yet, Tim Cook publicly released a letter against the FBI’s request for Apple to create software that would allow a backdoor into iPhones for national security reasons. Needless to say, that letter has sparked a ton of conversation around the encryption debate, and it’s bringing some other big names into the mix.

Qualcomm just announced new fingerprint authentication support for WeChat mobile payments

Vivo_X6

Each and every day, pins and passwords are becoming more and more a relic of the past thanks to new biometric authentication processes such as our fingerprints. It looks like Tencent’s WeChat mobile payment services will be the latest to join the biometric security revolution thanks to Qualcomm’s Snapdragon processor series.

It’s super easy to bypass factory reset protection on LG’s devices

lg_g4_display_corner_TA

When Android 5.1 was announced last year, Google revealed that the firmware carriers a new security protocol that makes it harder to factory reset stolen devices. What the functionality does is enforce a procedure that requires users to enter the credentials of the Google account that was linked to the handset before its system-wide wipe.

Unfortunately for LG owners, it appears that there’s a bug on the South Korean company’s phones making it incredibly easy to bypass the newly-introduced factory reset protection.

More Brain Test malware apps found in Play Store by Lookout

brain_test_malware_apps

Anti-virus and security company Lookout is reporting today that they discovered several apps in the Google Play Store that are part of the Brain Test family of malware. Brain Test attempts to gain root privilege on Android devices and can persist even through factory resets or other measures taken by users to remove it once discovered. Google has already removed 13 new apps that were identified in Lookout’s latest efforts.

Carrier IQ resurrected in deal with AT&T

BGR-ONLY-Carrier-IQ-Finder

Back in 2011, when the smartphone market was still relatively young, Carrier IQ earned a degree of infamy by being one of the first companies discovered to be collecting detailed user data and information surreptitiously on mobile devices. Since then, Carrier IQ has managed to stay out of the limelight until now when it was announced that AT&T has acquired rights to Carrier IQ’s software and to some staff that is coming on board at AT&T. At the same time, the Carrier IQ web site has gone dark and it is unclear what the status of the company is.

Synaptics Natural ID fingerprint readers can work through glass displays

oneplus_2_fingerprint_sensor_closeup

Fingerprint sensors in smartphones are great, but there is one huge thing that sucks about them. The placement. Some are built into the home button like on the Samsung Galaxy devices, but others are awkwardly on the back like on the new Nexus. However, this may all be a thing of the past thanks to Synaptics Natural ID.

Vulnerability in Chrome could allow attackers to take control of Android devices

data_security_encryption

In Tokyo, Japan, at the PacSec conference, security researcher Guang Gong revealed an exploit he developed over the past three months that enables a hacker to take control of an Android phone with no user interaction outside of clinking on a link in the Chrome browser. The exploit targets the JavaScript v8 engine in order to open the device up to delivery and installation of malicious code.