03/20/2015, 02:03 pm
Safari, Chrome, Firefox, and Internet Explorer were all successfully exploited during the second day of the annual Pwn2Own hacking contest in Vancouver.
New 'IP Box' tool bypasses 10-try limit for PINs on older iOS versions, automates brute force attacks
03/18/2015, 09:03 am
A relatively new $300 device could allow attackers to crack the PIN codes on out-of-date iPhones or iPads, taking advantage of a flaw in iOS versions older than 8.1.1 that allows unlimited attempts at PIN entry, even when users enable Apple's 10-try limit.
03/10/2015, 07:03 am
Classified documents released by whistleblower Edward Snowden reveal that the Central Intelligence Agency has been engaged in a multi-year coordinated effort to crack the security of Apple's iOS platform, which powers and protects the iPhone and iPad.
03/03/2015, 03:03 pm
A newly-discovered flaw in some implementations of cryptographic protocols SSL and TLS -- including those used by Apple's Safari and Google's Android AOSP browsers -- could allow an attacker to force clients to use older, weaker encryption that would make it significantly easier to intercept secure communications.
02/23/2015, 12:02 pm
Privacy advocates have long tried to educate consumers on the perils of giving apps access to GPS data, but a group of Stanford researchers has developed a method to infer a device's location from a seemingly much more innocuous source -- battery charge information.
02/19/2015, 02:02 pm
Chinese PC maker Lenovo has found itself in the middle of a public relations disaster, following revelations that it sold a number of notebook computers with pre-installed software that hijacks users' browser sessions to inject customized advertisements and seriously degrades the security of encrypted connections.
02/13/2015, 05:02 pm
Apple is among more than a half-dozen major U.S. corporations that have agreed to integrate the White House's Cybersecurity Framework into their operations, but the iPhone maker will not share security information with the federal government.
02/13/2015, 02:02 pm
Speaking at the White House Summit on Cybersecurity and Consumer Protection on Friday, Apple Chief Executive Tim Cook revealed that the U.S. government plans to begin accepting Apple Pay for a number of transactions, starting with admission to U.S. national parks.
02/12/2015, 05:02 pm
Apple continues to expand the range of offerings covered by its two-step verification scheme, with security-conscious users now able to count iMessage and FaceTime among those features protected by the service.
02/11/2015, 12:02 am
Once a hot item for thieves and pickpockets, Apple's iPhone is becoming a significantly less attractive target as the company's Activation Lock prevents the devices from being easily wiped and re-sold, a new report indicates.
02/09/2015, 09:02 pm
Apple's chief executive will reportedly be among those speaking to participants at Friday's White House Summit on Cybersecurity and Consumer Protection, an event designed to bring together representatives from all sides of the cybersecurity and privacy debate.
02/04/2015, 06:02 pm
A malware campaign known in the security industry as "Operation Pawn Storm" has begun to target Apple's iOS devices with a new malicious application that can steal photos, text messages, contacts, and other data from non-jailbroken iPhones, but which cannot be installed without users' consent.
01/26/2015, 01:01 pm
A Mac hardware vulnerability that has yet to be exploited on a wide scale will reportedly be fixed with Apple's forthcoming OS X 10.10.2 update for Yosemite, preventing any future attacks.
01/23/2015, 10:01 am
An internal software security research team at Google has publicly revealed three of recently-discovered zero-day exploits in Apple's Mac OS X desktop operating system, though the severity of each vulnerability is unknown.
01/22/2015, 11:01 am
China's State Internet Information Office will reportedly be allowed to conduct network security inspections of Apple products offered for sale in China as the company seeks to assuage fears that its devices can be used for intelligence gathering purposes by foreign governments.
01/21/2015, 11:01 am
Infamous former National Security Agency contractor Edward Snowden, responsible for leaking thousands of pages of classified intelligence documents from the secretive spy organization, reportedly believes that the iPhone contains "special software" that can be remotely activated by authorities for intelligence gathering purposes.
01/09/2015, 12:01 pm
Mac owners who regularly make use of OS X's built-in Mail application and Spotlight search should take care when searching through e-mail messages, as Spotlight's preview functionality has been shown to ignore Mail's remote content settings and could inadvertently transmit unintended data to email senders.
12/22/2014, 02:12 pm
At next week's Chaos Communication Congress in Germany, a researcher will demonstrate a method in which a malicious actor could use a specially-crafted Thunderbolt device to inject a bootkit -- which could survive nearly any attempt to remove it -- into the EFI boot ROM of any Mac with a Thunderbolt port.
Massive, sophisticated "Inception - Cloud Atlas" malware infects Windows and Android but can't exploit Apple's iOS without jailbreak
12/11/2014, 03:12 pm
A vast and sophisticated new espionage campaign targeting "military, diplomats, and business execs," discovered by Blue Coat Labs and confirmed by Kaspersky Labs, exploits flaws in Microsoft Windows and seeks to infect Android, Blackberry and iOS devices, but is limited to only infecting iPhones and iPads that are jailbroken.
11/26/2014, 12:11 am
The United States Department of Justice has fined the CEO of spyware vendor StealthGenie $500,000 and demanded the firm turn over the source code for software designed to remotely monitor calls, texts and other activity on Android and jailbroken iOS devices.