Must-Have iPhone Security Apps
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
3883 articles
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.
Android devices are the most prevalent smartphones on the market, and the most maligned. Hackers had a banner year in 2012 targeting the mobile platform with a variety of malware
Cybercrime is a funny business. The common element in cybercrime operations is that attackers enjoy virtual anonymity and a low chance of detections. And like most kinds of thievery, it
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
Jailbreaking your mobile device – that is, freeing it from its locked-down status in order to run unauthorized software – used to be for hardcore techies. Not anymore. These days
U.S. customs officials are increasingly interested in the data stored on mobile devices and laptops. For international travelers who have sensitive data on their phones (we mean corporate folks, not
Hackers spent much of 2012 laying the groundwork for what they have in store for not only big business and strategic government and military targets, but consumers as well in
The latest in Threatposts‘s how-to series is a short video to help consumers stay safe online not just on Cyber Monday and Black Friday but throughout the holiday shopping season.
Making a good password is more important than ever and with as many sensitive accounts – email, credit cards, shared documents – as we have online today there’s simply no
In a study of just how much people value their privacy, Carnegie Mellon University professor Alessandro Acquisti and other researchers went to a mall outside of Pittsburgh, Pa. They had
One of the little compromises that we’ve all had to make to get the advantages of mobile apps is the blind acceptance of the terms of service for the app
The days of retail shopping during the holiday season have given way to the age of E-tail: Experts predict that more shopping will be done online than in physical stores
The hacking of Gmail accounts has been a constant occurrence for several years now. Those who have had their own accounts hacked know that Gmail notifies users when their accounts
A report out earlier this year indicated that robbing banks in the UK is a risky business, and not very lucrative at that: Bank burglars in Great Britain net an
Smartphones and tablets make it possible for business travelers to stay connected to their corporate networks while on the road as never before. But, like any other platform, these mobile
For users, the browser is the key to their online lives. It holds their histories, their secrets, tracks their movements and stores their passwords. So for attackers, the browser is
The reality is that, on the whole, security for gamers and gaming isn’t all that different than best practices for normal online, social networking activities. You need to maintain strong
One of the many problems inherent in social networks such as Twitter, Facebook and LinkedIn is the issue of authentication. People want to connect with their friends and colleagues, but
There is no shortage of hard problems to solve in security. Unsafe Web applications, network defense, mobile device security–all of these are challenges in need of solutions. And the students
A common lament in the security industry is the lack of young talent, of educated and dedicated people coming out of universities with fresh ideas. Executives and engineers often wonder