
Security Week 39: XcodeGhost, the leak of D-Link certificates, $1M for bugs in iOS9
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
130 articles
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Apple patched a serious issue in its App Store and iTunes Store, which could have undermined many of the businesses working in this ecosystem.
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event. Here are the 10 best quotes from his speech.
Hardware is usually considered relatively safe and clean — as opposed to software which is usually the layer suffering from bugs and malware. But this is no longer true
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
Whether you’re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.
As is, a QR code can quickly take you to a site or another resource but not necessarily to the one you really want to visit. Thus Kaspersky Lab offers a free and safe QR scanner!
A researcher has developed a nasty bootkit capable of taking complete control of OS X devices. Here is what you need to know.
Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your child’s iPad.
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Yesterday, researchers disclosed a powerful iOS vulnerability that is responsible for the WireLurker Apple malware.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.