Fraudulent Apps on Apple’s App Store
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
1126 articles
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
You might think that, much like a pirate going into battle, the more weapons you have at your disposal for your protection the better: cutlass in one hand, pistol and
Protecting your home network is as daunting a task as you make it. If your home network consists of a wireless router and a laptop, then it’s pretty easy to
For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel with us on a
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
On the night of 5 June 2013, a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
The popular microblogging website, Tumblr, announced a breach in its security for iOS customers last week. The company asked all users of its iPhone and iPad app to change their
Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there’d be some serious value in a
There is an entire market of plugins out there designed to keep you safe while surfing the web on your browser of choice. Each one has lots of options; for
A newly discovered vulnerability in a popular browser exposes how photos can be taken of unsuspecting users. Further proof of hackers’ inventiveness appeared last week in the form of a
In late 2011, it emerged that Chinese hackers had thoroughly compromised the United States Chamber of Commerce, perforating the lobbying-group’s networks with a devastating chain of backdoors. Chamber officials admitted
It’s harder and harder to keep your personal information private when browsing the web, but fortunately there is an entire market of add-on utilities, known as plugins, designed to keep
Father’s Day is fast approaching, which means finding the perfect gift for dad should be at the top of your to do list. And if you’ve had your eye on
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
APT stands for advanced persistent threat. It became famous following a New York Times exposé detailing a month’s long attack campaign in which a Chinese military unit now known as
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
We recently wrote about the conspicuous lack of privacy discussion at Google’s recent I/O Conference in San Francisco. While it’s true that there wasn’t much talk of privacy at the
The owners of smartphones running Android and iOS sometimes enter into heated discussions as to whether it’s worthwhile to perform the mysterious procedures known as rooting and jailbreaking their devices.
Everybody talks about HTTPS and being careful with credit or debit cards online, but what makes you think your cards are safe offline? I can’t speak for anyone other than