Cyber criminals have found a way to harvest data from iPhones and iPads using the weak point in Apple’s otherwise top security system - app developers.
Reports suggest President Xi will meet with US tech leaders this week. Will that overshadow his meeting with President Obama?
Reuters
While the timing of the planned forum is not ideal, it continues a long tradition of Chinese leaders engaging with US tech leaders and may prove beneficial to overall relations.
No matter how many times people are warned to set strong secure passwords, many don’t. So why do people take the risk? And is there anything else they can do to be more secure online?
Giving away the keys to cybercriminals.
Intel Free Press/flickr
Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. There are a number of surprising observations…
The pathogens are secured, but are the data about them as well-protected?
Wolfgang Rattay/Reuters
The argument has been raging for years: which operating system is the safest when it comes to security. Has the latest software upgrades from the tech giants changed anything?
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
When your car becomes a computer, your problems just got much bigger.
car by Denys Prykhodov/shutterstock.com
In what has been labelled as poetic justice by some, the Hacking Team, an Italian company that sells mass computer and mobile device surveillance software has itself been hacked. The alleged hackers, tweeting…