Security Week 36: jailbreak theft, farewell to RC4 and holes in routers
Our lives will be smooth once PCs are embedded into our brains. Text messages will be replaced by ‘mentalgrams,’ whispered to us subtly by our inner voice. Has a bright
118 articles
Our lives will be smooth once PCs are embedded into our brains. Text messages will be replaced by ‘mentalgrams,’ whispered to us subtly by our inner voice. Has a bright
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more
We all know that cybercriminals would love to infect your PC or Laptop with a virus or trick you to install a malware. What you might not know is that
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
According to a survey conducted by Kaspersky Lab and B2B International over a 12-month period, 22% of parents polled indicated that their children were affected by cyber incidents. Examples of these
For children, modern phones and tablets often serve predominantly as universal game consoles. While there are hundreds of thousands of games to choose from, not all games are suitable for children: some
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.
Our study during World Cup indicates one in four networks are dangerous and you must take care to avoid substantial loss.
How iOS 8 and Tizen releases affect smartphone market and security landscape.
Discussing security and the privacy strengths and weaknesses in the Apple’s soon-to-be-released iOS 8.
Adults can choose to face the financial consequences of their own actions, but they may want to know how to prevent their kids from running up exorbitant credit card bills tied to the parents’ iTunes or Google Play accounts.
App stores offer all the promise of a virtually unlimited range of games and tools, but are rife with pitfalls too. These include bad apps, ballooning costs, and malicious apps, particularly on Android devices.
New ransomware targets Apple users running iOS mobile and O SX Mac devices with a piece of malware that blocks use and demands payments.
But while Android’s market figures continue to pile up, so do the knocks against the company’s security protocols.