A data forensics expert and jailbreaker has discovered what he claims to be a undocumented “backdoor” in the iOS operating system used on iPhones and iPads that could be exploited by the NSA and other law enforcement agencies. Read more in my article on the Intego Mac Security blog.
Hacker claims to have found undocumented iOS “backdoor”; Apple denies NSA collusion http://bit.ly/1z3SPr0
Google’s Project Zero – Targeting zero-day vulnerabilities http://bit.ly/1spAT9z
Google has announced that it is assembling a crack team of researchers, devoted to finding and reporting security holes in widely used software. Read more in my article on Lumension’s Optimal Security blog.
Critical patches for Java released – Patch now or put it out of its misery http://bit.ly/1nbkPGm
Oracle’s latest security update is said to fix 20 vulnerabilities in Java, all of which can be exploited by remote hackers bent on breaking into and compromising your computer. You should be asking yourself if you need Java at all… Learn more in my article on the Intego Mac Security blog.
Hacked Japanese porn sites spread banking malware attack http://bit.ly/U9H5U7
Thinking of spending some time perusing Japanese porn websites before you do your online banking? Security researchers at ESET have analysed an organised malware campaign that stole the login credentials of online banking customers after infecting PCs that had visited X-rated websites. Read more in my article on the We Live Security website.
Are typewriters really the way to stop cyberspying? Germany seems to think so http://bit.ly/WgYwnV
Concern about electronic surveillance by other countries has become such a big issue in Germany that prominent politicians say they are seriously considering using manual typewriters instead of computers. Read more in my article on the Hot for Security blog.
Sharing secret files more safely: Some questions to ask yourself http://bit.ly/1ymEQw7
How can you share files safely? Whether you’re sharing through a secret URL, or consumer online services, there are privacy and security issues to consider. Read more in my article on the Intralinks blog.
Page 1 of 67
← Newer • Older →