AceDeciever: the malware that can infect ANY iPhone
A pirate app store that has tricked Apple and passed its code review is now stealing user’s creden-tials using FairPlay Man-in-the Middle attack.
105 articles
A pirate app store that has tricked Apple and passed its code review is now stealing user’s creden-tials using FairPlay Man-in-the Middle attack.
It’s not the best idea to use Safari on your phone with no ad blocker at all. You can remedy this omission with the help of our new iOS app Kaspersky AdCleaner!
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
The next step in SIM cards evolution is not about squeezing them into even more miniscule form factor, it’s about replacing them at all — with a profile stored in connected device.
Over the past week or so, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
We are so used to divide the concept of IT security into two unequal subcategories, hardware- and software-centric. The hardware is usually considered relatively safe and clean — as opposed
It’s always fun to observe commodity, non-vertically integrated tech manufacturers toss and twitch as distant rumours start rumbling about Apple entering yet another product category. Those companies don’t completely own
The first ever publicly known Mac OS X firmware bootkit emerged out of the 31st Chaos Computer Club conference in Hamburg, Germany last month. Security researcher Trammel Hudson developed the
I have three kids. The eldest is so mature he has migrated to his own laptop (which I successfully ‘upgraded’ with parental control to prevent any inappropriate content from popping
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Yesterday, researchers disclosed a powerful iOS vulnerability that is responsible for the WireLurker Apple malware.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.