security

558 articles

Vulnerabilities in the iPhone

Apple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune

Twitter security tips

The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it

The Threat Landscape

The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As