Stop iOS tracking
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
111 articles
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
If the rumors are true, 40 million Apple iCloud accounts have been hacked
Apple no longer encrypts the kernel of its iOS operating system. It seems that this is another step towards turning iOS into something similar to Android.
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
Apple iPhone users tend to think their device is absolutely secure. We will take you through several types of attacks which usually target Apple’s smartphones.
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
A pirate app store that has tricked Apple and passed its code review is now stealing user’s creden-tials using FairPlay Man-in-the Middle attack.
It’s not the best idea to use Safari on your phone with no ad blocker at all. You can remedy this omission with the help of our new iOS app Kaspersky AdCleaner!
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
The next step in SIM cards evolution is not about squeezing them into even more miniscule form factor, it’s about replacing them at all — with a profile stored in connected device.
Over the past week or so, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
We are so used to divide the concept of IT security into two unequal subcategories, hardware- and software-centric. The hardware is usually considered relatively safe and clean — as opposed
It’s always fun to observe commodity, non-vertically integrated tech manufacturers toss and twitch as distant rumours start rumbling about Apple entering yet another product category. Those companies don’t completely own