Apple's been keeping itself busy patching up security holes in its software, both for mobile and on the desktop. Just last week, Apple rolled out an update for iOS—version 9.3.5—that patched up several critical security and privacy exploits, and now there's a pair of updates for OS X that addresses the same security...Read more...
Apple has filed a patent application with the United States Patent & Trademark Office (USPTO) that could flip the script on iPhone and iPad thieves looking for a fast payday. What they'll get instead is a visit from local law enforcement—the patent involves taking a snapshot and capturing the fingerprint of the thief...Read more...
Even Apple's software isn't immune to security holes and vulnerabilities. An admission of such by Tim Cook and the gang comes in the form of a new bug bounty program Apple announced at the Black Hat conference today in Las Vegas, Nevada. The program kicks off in September and will offer cash rewards for certain...Read more...
If you've shopped at Acer's US website at any point between May 12, 2015 and April 28, 2016, you have immediate reason for concern. Acer has just revealed to the California Attorney General's office that its ecommerce servers were hit last spring, and remained vulnerable up until this spring. Unfortunately, this isn't...Read more...
We don't need to tell you that Apple has been dealing with some extreme issues revolving around encryption in recent months. Most of the hassle was spurred back in December when the FBI wanted the Cupertino company to help break into a terrorist's iPhone 5c, something it refused to do.
As time went on, the FBI...Read more...
It's fair to say that relations between the U.S. and China are strained, especially in regards to technology. Security researchers have often traced cyberattacks big and small back to China, for which the Chinese government often denies, and there's contention over shipping products to the region. The latter is likely...Read more...
Here's a tip for anyone who owns a smartphone (so pretty much everybody)—don't leave your handset out in the open and unattended, even if you've locked it. Case in point, an online video making the rounds showed how it was possible to bypass an iPhone's passcode using Siri to access the device's contacts and...Read more...
The FBI dropped its case against Apple yesterday claiming it had extracted the contents of the now infamous iPhone 5c model that belonged to Syed Farook, the terrorist involved in the San Bernardino shooting, with the assistance of a third-party. It's as much a win for Apple as it is for the FBI, though instead of...Read more...
Apple and the FBI have locked horns with one another over an iPhone 5c model that belonged to one of the San Bernardino shooters, but what seems like a suddenly contentious relationship may have roots that go even deeper. If a new report is to be believed, Apple's distrust of the U.S. government runs so deep that it's...Read more...
It's been an incredible month for Apple, the FBI, and all of us. We've been sitting back, watching the battle of these two giants, as a conclusion about whether or not the FBI should have a right to access encrypted data on someone's smartphone is reached. It seems like not a day can go by without an update to this...Read more...
ASUS crafts some of the highest-performing and best-looking wireless routers on the market, but as far as the Federal Trade Commission (FTC) is concerned, it's also crafted some of the most insecure.
The FTC alleges that ASUS put "hundreds of thousands" of users at risk because they were oblivious to some serious...Read more...
In the fall of 2014, Google lost a valuable man: Andy Rubin. While Rubin had his hands in a number of important projects at the big G, none were more important than his creation of Android in 2003. Today, Android is the most widely-used mobile OS; one that's even making its way to convertible PCs. To call that...Read more...
Security outfit AVG is catching some heat for a Chrome browser extension that left millions of users vulnerable to a variety of online attacks. Called "AVG Web TuneUp," it automatically gets installed into Chrome as part of AVG's antivirus product. That's problem number one. Problem number two is that it presented...Read more...
2015 has proven to be a massive year for Adobe's Flash plugin, but for all the wrong reasons. Flash is already infamous for being one of the most vulnerable pieces of software on the planet, but in 2015, 316 bugs were found and squashed. That comes out to about 6 bugs per week for a piece of software that's used by the vast majority of notebook Read more...
Some Amazon shoppers report having received an email from the online retailer to let them know that their passwords have been reset. Usually that's cause for concern, such as a security breach -- something that's become all too common as of late -- but in this case Amazon says it's simply being cautious.
If that's...Read more...
Let me start by saying that Siri and I have a solid relationship. If I need directions to a place I've never been before or a reminder set, she dutifully obliges every single time. I like that. But if Siri turns on me and starts sharing my personal info without my permission, as a major security firm says is possible...Read more...
Security firm Lookout has just revealed what could be one of the most hard-hitting pieces of malware to ever hit Android. It doesn't have an official name, except to be referred to as "trojanized adware", and right from the top, we can tell you that if you only stick to downloading apps through Google's Play Store...Read more...
The security gurus at Trend Micro believe that the cyber attackers behind Pawn Storm are performing their dirty deeds by way of a new zero-day vulnerability in none other than Adobe's Flash platform. Shocking that Flash is at the root of it all, isn't it? This is where we all feign surprise, sarcastically of...Read more...
If you go out of your way to protect your privacy with everything you do, you undoubtedly know how complicated it can be while mobile. Most phone makers simply don't put much of an emphasis on user privacy, usually sticking to the bare minimum, or in other words, what's generally expected. Some others, however, go the...Read more...
Updated
The lock screen on your phone might not be foolproof as you thought. Researchers at The University of Texas at Austin released a demonstration this week of what they say is a vulnerability in mobile devices running Android 5.x. Also known as Lollipop, it is the latest version of Android and is run by many...Read more...
There have been several high profile security breaches over the last couple of years, and in many instances, cyber thieves were able to extract personal information of their target's customers. Usually this resulted in the company offering a free year of identity theft protection to those affected, though in the...Read more...
While the NSA had the support of all US telcos with its spying efforts, it's come to light that none offered the level of assistance that AT&T did. Recent documents that are part of the ongoing Snowden leaks show the NSA heaping a bit of praise on its relationship with AT&T, saying it was "highly collaborative" and...Read more...