Security

No, OS X is NOT the 'most vulnerable OS' despite shoddy reporting

Security, as we take great pains to repeatedly point out, is something that deeply affects people. It affects their stress and trust levels when dealing with technology. When it's misreported it turns what should be an empowering experience into one of fear, uncertainty, and doubt. And it's far too frequently done just to get the worst kind of attention. The latest case in point is a — I don't want to call it a report — from GFI which claims OS X and iOS were the "most vulnerable operating systems of 2014. And, frankly, it's bullshit.

More →

20
loading...
0
loading...
261
loading...
0
loading...

Got adware problems? Blame free software download sites

Mac adware is bad. Windows is worse. Who's to blame? Free software download sites.

More →

8
loading...
0
loading...
66
loading...
0
loading...

Masque Attack not revived — iOS 8.1.3 prevents trust bypass

A Masque Attack — the abuse of Apple's iOS developer certificates to try and trick people into installing malware apps on their iPhones or iPads — has reportedly entered a second phase which, turns out, is much like it's first phase.

More →

17
loading...
0
loading...
71
loading...
0
loading...

Switch to iPhone: For better privacy and security

There's never been a better time to switch to iPhone. Whether you're tempted for yourself or looking to help the Android owner in your life, the all-new, all-better iPhone 6 and iPhone-6-plus make the move more compelling than ever — especially when you add the value of privacy and security.

More →

72
loading...
102
loading...
190
loading...
0
loading...

How to enable two-step verification for your Apple ID

Most people use their Apple ID account not only for iCloud data, but to purchase content from iTunes and the App Store. That means that anyone who gets ahold of your account or manages to change your password could have access to your personal information and credit card information. If you want to increase the security of your Apple ID, you can use two-step verification to add a second layer of protection. That, it requires something you know (your password) and something you have (the security token sent to you) to access your account information and make changes.

More →

34
loading...
0
loading...
362
loading...
0
loading...

Operation Pawn Storm spyware and what you need to know

Operation Pawn Storm appears to be the latest in a type of attack that uses jailbreak or enterprise distribution certificates to transfer spyware onto iOS devices. That means, in order to be infected, you have to first remove Apple's built-in security protection by jailbreaking, or tapping to agree to the installation of an app from outside the App Store. In other words, for most people, most of the time, it's something to be informed about but absolutely nothing to be stressed or scared by.

More →

10
loading...
0
loading...
72
loading...
0
loading...

'Thunderstrike' attack also fixed in OS X 10.10.2

"Thunderstrike" is the name for an attack that can target Mac hardware via the Thunderbolt port. Apple had previously updated the Retina 5K iMac and 2014 Mac mini to partially secure them against Thunderstrike. Now, the upcoming OS X Yosemite 10.10.2 will fix the problem for all recent Macs running Yosemite.

More →

15
loading...
0
loading...
133
loading...
0
loading...

How to control which iPhone and iPad apps can access your Twitter and Facebook accounts

We use Facebook and Twitter for more than just talking with our virtual social communities these days. We use them to login to other sites, to comment, to register — to host our digital identity. That's why it's a good idea to check and control which iPhone and iPad apps have access to your Facebook and Twitter accounts. The best part is you don't even have to log in to Facebook or Twitter on the web. You can do it right from your iPhone or iPad!

More →

8
loading...
0
loading...
44
loading...
0
loading...

Latest OS X 10.10.2 beta kills Google-disclosed vulnerabilities dead

Google's Project Zero research program has disclosed and released proof-of-concept code for a series of 0day — previously unknown — vulnerabilities found in Apple's OS X operating system for the Mac. These exploits are all fixed in OS X Yosemite 10.10.2, now in beta.

More →

22
loading...
0
loading...
119
loading...
0
loading...

Things you don't need to worry about: Snowden doesn't use an iPhone, says his lawyer

There's a story going around that quotes NSA whistleblower Edward Snowden's lawyer as saying Snowden won't use an iPhone because it has "special software" that could gather information about him. Instead, the lawyer says, Snowden has a simple phone". There's no first-hand account from Snowden and no details about what the "special software" might be — a web cookie? who knows! — but that hasn't stopped the quote from making its way across the sensationalism-over-security parts of the internet. So, what's really going?

More →

16
loading...
0
loading...
72
loading...
0
loading...

Pages