Security Week 39: XcodeGhost, the leak of D-Link certificates, $1M for bugs in iOS9
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
127 articles
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Which brain mechanisms are in charge of our memory? Kaspersky Lab analyzed why we forget information stored on our devices.
While surfing the Internet, children may come across web pages containing inappropriate information. IT solutions can help protect children from such content.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Children who use mobile devices can be more vulnerable to cyber threats because they are free to surf the Internet at any time or place, without adult supervision.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Yesterday, researchers disclosed a powerful iOS vulnerability that is responsible for the WireLurker Apple malware.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
iOS-based devices have a large share in the enterprise, which assures a strong demand for BYOD-oriented security features. A number of them arrive in iOS 8.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Free antivirus programs offer basic protections, but in order to be protected against phishing attacks that can steal your personal and financial data you need an Internet browser security program.
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.
Our study during World Cup indicates one in four networks are dangerous and you must take care to avoid substantial loss.