How Apple iOS stirs towards Android
You’ve probably heard it before but we’ll say it once more: Apple does not encrypt the kernel starting from iOS 10. Well, OK, the kernel is not encrypted, so what?
109 articles
You’ve probably heard it before but we’ll say it once more: Apple does not encrypt the kernel starting from iOS 10. Well, OK, the kernel is not encrypted, so what?
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s
Apple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune
There is and always has been an inherent tension between an individual’s right to data privacy and wider security concerns. This is unlikely to change, although the priority may shift
Apple iPhone users usually consider their phones as impregnable fortresses that Apple has built for them: iPhones are often said to be secure and safe, especially when compared to Android
Modern men and women can hardly imagine themselves without their mobile devices, similarly experienced Internet users won’t surf web without an ad blocker. Their popularity has risen fast: as early
Recently engineers who have been working to improve legacy cellular technologies, were stricken with a thought: “Why would one need a SIM card, if it’s nothing more than a protected data
Recently Samsung introduced the Gear S2 Classic 3G smart watch, which is the first device with eSIM support. Although it is a pilot, this technology is bound to spark a
Over the past week-plus, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in the San
When find yourself caught in the eye of the storm, you might have problems understanding what has really happened. While stuck in a traffic jam, you would never know it
I would like to start this week’s new edition of Security Week with news that has nothing to do with information security. Volkswagen diesel vehicles happened to be emitting far
A worm was found in the safe garden of Apple. About 40 iOS apps are now being cleaned out of the App Store because they turned out to be infected
“Three billion human lives ended on August 29, 1997. The survivors of the nuclear fire called the war Judgment Day. They lived only to face a new nightmare: the war
Our lives will be smooth once PCs are embedded into our brains. Text messages will be replaced by ‘mentalgrams,’ whispered to us subtly by our inner voice. Has a bright
What a dreadful week this one has been for the infosec industry, my friends. Following an amusing week of discovering bugs, zero-days and other researcher-coveted curios, here comes the painful
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
A researcher has developed a nasty bootkit capable of taking complete control of Mac OS X devices. Here is what you need to know.
Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your child’s iPad.
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.