Talk Security: ShellShock Bash Vulnerability Dominates September
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
1447 articles
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
Virus Bulletin is a traditionally enterprise-focused event, but each year topics of consumer interest, like Apple malware, hackable devices and Bitcoin are presented.
The Bash vulnerability affecting Unix, Linux and OS X systems is the latest Internet-wide bug to emerge, and a number of experts are saying it’s more dangerous than OpenSSL Heartbleed.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
A new poll shows Americans care overwhelmingly about digital privacy.
A number of popular Android applications are putting sensitive user data at risk of exposure because the app developers are not fully implementing encryption.
The final month of summer wasn’t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.
Tor is an online browsing portal that keeps your web activity completely anonymous.
A survey reveals the motivations behind hacker attacks, showing that they are not afraid of consequences.
On September 9th, Apple showed some new devices and its own payment system, which utilizes an NFC chip, Touch ID sensor and Passbook app. So we had a try to find out how it works, what it gives us and how well this system is protected.
KL and Mensa have announced the first champion of the Global Think Test challenge.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
Your data is the finest treasure on your computer. Protect it the way the secret service protects a president, create a robust defense system where an antivirus will be just the last line of defense.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
It would be nice to think that it would take a lot more than an overeager amateur hacker like Seth Green’s character from the 2003 movie “The Italian Job,” to bring traffic to a screeching halt.
Preparing to watch your child trundle off to school with these expensive devices in their backpacks will be a lot easier if you guard against the many perils that can threaten them – theft, malware and unwanted Internet browsing chief among them.