Read full post They’ll be easy to lock and unlock… and they don’t exist yet
Read full post The app’s novel approach turns Digital Rights Management on its head
Read full post Device-based data requests from government agencies dropped in the first half over last year, but Apple fulfilled a higher percentage of those requests, according to its transparency report.
Read full post We have surprisingly little data on how to evaluate infosec job candidates academic qualifications. That needs to change.
Read full post DirtyCOW can be used to compromise phones and tablets
Read full post Cloud services are very much what you make of them, and you need to apply at least an equivalent level of rigorousness, in terms of risk assessment, as you would with assets that are hosted on your...
Read full post Get the lowdown on Apple’s newly released Face ID Security Overview
Read full post Showtime Site Found Using Cryptocurrency Miner Following the discovery last week that ThePirateBay has been using a Monero miner to experiment with revenue alternatives for the site, researchers have found that both Showtime.com and ShowtimeAnytime.com have embedded...
Read full post Social media handles, aliases, associated identifiable information and search results are included
Read full post Cyberthieves are impersonating banks to send bogus “secure” bank email messages.
Read full post What’s safer? Using a numeric PIN code to unlock your Android smartphone or relying on a finger squiggle? The answer might surprise you. The post Your Android lock screen pattern isn’t as safe as a PIN code...
Read full post Device and requests went down, but secret and classified orders spiked by more than three-fold.
Read full post Shoulder surfing beats a 6 point unlock pattern most of the time
Read full post While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware. The post Money-making machine: Monero-mining malware appeared first on WeLiveSecurity
Read full post 68% of the Android and iOS apps tested failed to validate TLS certificates
Read full post Late September attacks highlight the persistent nature of ransomware threats, Comodo says.
Read full post Another day, another phishing attack. From businesses to consumers, phishing attacks are becoming a more widespread and dangerous online threat every year. One wrong click could quickly turn into a nightmare if you aren’t aware of the...
Read full post The infrastructure behind a web shell used in an attack earlier this year suggests methodical and purposeful threat actors, Palo Alto Networks says.
Read full post Launches program to incorporate security by design and a strategic governance policy across all of its IoT products.
Read full post Instagram introduces new tools to promote a safe, kind environment
Read full post Muhammad Rabbani was found guilty of obstructing justice after refusing to unlock his laptop and smartphone
Read full post The crew were providing security for the annual United Nations General Assembly
Read full post Millions of UK residents with vulnerable devices are unwittingly contributing to the epidemic.
Read full post IOActive’s review of 21 of the most used mobile apps for investment trading shows a majority of them exposing users to various security risks.