10 tips to make your iPhone even more secure
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
764 articles
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
iOS-based devices have a large share in the enterprise, which assures a strong demand for BYOD-oriented security features. A number of them arrive in iOS 8.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
A new poll shows Americans care overwhelmingly about digital privacy.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
The biggest concern about Apple Pay is that one’s iCloud account now controls not only private photos, app data, and messages, but also money. You lose your password – you lose everything and as the celebrity hack showed us, there is no need to hack Apple’s servers. Social engineering, phishing, trojans – all cybercriminal tools will now be targeted at people’s electronic wallets.
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
We have bought our very own Blackphone to check its security firsthand.
Malware using Tor for communication with C&C servers is a novelty; it may not make the malware itself more dangerous, but eradicating it becomes a much more serious problem.
Losing your work or personal data is a computing worst case scenario. While there is no shortage of ways you can lose your data, there are also a number of protections that can help.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
451 Research has released a very complimentary overview of Kaspersky Lab’s current position and strengths. Here’s some commentary from their report.
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.
Big Data is widely used for security purposes, especially in the banking sphere. However, the amount of security-related data causes an issue of its own.
Big Data is widely used by businesses to gather information on their consumers. But it’s quite evident that the same Big Data may be used against the businesses as well.
This week: the first mobile malware turns 10; we check in on Android security news and recent data breaches; and we fill you in on the week’s patches.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?