
Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
118 articles
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
We are so used to divide the concept of IT security into two unequal subcategories, hardware- and software-centric. The hardware is usually considered relatively safe and clean — as opposed
It’s always fun to observe commodity, non-vertically integrated tech manufacturers toss and twitch as distant rumours start rumbling about Apple entering yet another product category. Those companies don’t completely own
The first ever publicly known Mac OS X firmware bootkit emerged out of the 31st Chaos Computer Club conference in Hamburg, Germany last month. Security researcher Trammel Hudson developed the
I have three kids. The eldest is so mature he has migrated to his own laptop (which I successfully ‘upgraded’ with parental control to prevent any inappropriate content from popping
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Yesterday, researchers disclosed a powerful iOS vulnerability that is responsible for the WireLurker Apple malware.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
There’s been much hoopla in recent weeks over claims from Apple and Google that user content stored in the latest iterations of the iOS and Android operating systems is encrypted
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
Virus Bulletin is a traditionally enterprise-focused event, but each year topics of consumer interest, like Apple malware, hackable devices and Bitcoin are presented.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
How iOS 8 and Tizen releases affect smartphone market and security landscape.