More Featured Articles

Masque Attack not revived — iOS 8.1.3 prevents trust bypass

Masque Attack not revived — iOS 8.1.3 prevents trust bypass

A Masque Attack — the abuse of Apple's iOS developer certificates to try and trick people into installing malware apps on their iPhones or iPads — has reportedly entered a second phase which, turns out, is much like it's first phase. According to FireEye: Masque Attack II includes bypassing...
Things you don't need to worry about: Snowden doesn't use an iPhone, says his lawyer

Things you don't need to worry about: Snowden doesn't use an iPhone, says his lawyer

There's a story going around that quotes NSA whistleblower Edward Snowden's lawyer as saying Snowden won't use an iPhone because it has "special software" that could gather information about him. Instead, the lawyer says, Snowden has a simple phone". There's no first-hand account from Snowden and...
Best password manager apps for iPhone and iPad: 1Password, Dashlane, mSecure, and more!

Best password manager apps for iPhone and iPad

The best password manager apps for iPhone and iPad to help you create strong passwords, keep them secure, and use them when you need them! On the hunt for the best iPhone apps and best iPad apps to help you create, store, and manage all your passwords and logins? Passwords are what keep our...
Security RSS Feed
No, OS X is NOT the 'most vulnerable OS' despite shoddy reporting

No, OS X is NOT the 'most vulnerable OS' despite shoddy reporting

Security, as we take great pains to repeatedly point out, is something that deeply affects people. It affects their stress and trust levels when dealing with technology. When it's misreported it turns what should be an empowering experience into one of fear, uncertainty, and doubt. And it's far...
Got adware problems? Blame free software download sites

Got adware problems? Blame free software download sites

Mac adware is bad. Windows is worse. Who's to blame? Free software download sites. Weren't we just talking about how to get rid of Mac adware? This is a real and malevolent threat on the Mac. We have it easy compared to our Windows using colleagues with horrors like Superfish. InfoSec Taylor...
Masque Attack not revived — iOS 8.1.3 prevents trust bypass

Masque Attack not revived — iOS 8.1.3 prevents trust bypass

A Masque Attack — the abuse of Apple's iOS developer certificates to try and trick people into installing malware apps on their iPhones or iPads — has reportedly entered a second phase which, turns out, is much like it's first phase. According to FireEye: Masque Attack II includes bypassing...
Switch to iPhone: For better privacy and security

Switch to iPhone: For better privacy and security

There's never been a better time to switch to iPhone. Whether you're tempted for yourself or looking to help the Android owner in your life, the all-new, all-better iPhone 6 and iPhone-6-plus make the move more compelling than ever — especially when you add the value of privacy and security. The...
How to enable two-step verification for your Apple ID

How to enable two-step verification for your Apple ID

Most people use their Apple ID account not only for iCloud data, but to purchase content from iTunes and the App Store. That means that anyone who gets ahold of your account or manages to change your password could have access to your personal information and credit card information. If you want...
Operation Pawn Storm spyware and what you need to know

Operation Pawn Storm spyware and what you need to know

Operation Pawn Storm appears to be the latest in a type of attack that uses jailbreak or enterprise distribution certificates to transfer spyware onto iOS devices. That means, in order to be infected, you have to first remove Apple's built-in security protection by jailbreaking, or tapping to...
'Thunderstrike' attack also fixed in OS X 10.10.2

'Thunderstrike' attack also fixed in OS X 10.10.2

"Thunderstrike" is the name for an attack that can target Mac hardware via the Thunderbolt port. Apple had previously updated the Retina 5K iMac and 2014 Mac mini to partially secure them against Thunderstrike. Now, the upcoming OS X Yosemite 10.10.2 will fix the problem for all recent Macs...
How to control what iOS apps can access your Twitter and Facebook accounts

How to control which iPhone and iPad apps can access your Twitter and Facebook accounts

We use Facebook and Twitter for more than just talking with our virtual social communities these days. We use them to login to other sites, to comment, to register — to host our digital identity. That's why it's a good idea to check and control which iPhone and iPad apps have access to your...
Latest OS X 10.10.2 beta kills Google-disclosed vulnerabilities dead

Latest OS X 10.10.2 beta kills Google-disclosed vulnerabilities dead

Google's Project Zero research program has disclosed and released proof-of-concept code for a series of 0day — previously unknown — vulnerabilities found in Apple's OS X operating system for the Mac. These exploits are all fixed in OS X Yosemite 10.10.2, now in beta. Here's a report on the...
Things you don't need to worry about: Snowden doesn't use an iPhone, says his lawyer

Things you don't need to worry about: Snowden doesn't use an iPhone, says his lawyer

There's a story going around that quotes NSA whistleblower Edward Snowden's lawyer as saying Snowden won't use an iPhone because it has "special software" that could gather information about him. Instead, the lawyer says, Snowden has a simple phone". There's no first-hand account from Snowden and...

Pages