Apple has fixed two critical vulnerabilities in Safari 6, as well as flaws in iOS 6.
Admitting to the vulnerability, Apple is suggesting that users employ iMessage as a workaround.
The computing giant's first-ever foray into speaking at Black Hat about its security didn't reveal much more than what already was known.
The "Find and Call" app, which uploads a user's contact list to a remote server so its developers can spam friends and colleagues of the victim, is the first malware to enter the Apple App Store.
Flame, Stuxnet, breach at LinkedIn and other security news
Users of Apple's new mobile operating system, set for final release in the fall, will now be able to grant or deny apps from accessing personal data.
A difficult-to-find vulnerability, disclosed in March at Google's inaugural hacker competition, was among the iOS fixes.
Apple on Wednesday updated its iOS mobile operating system to rectify more than 80 vulnerabilities.
The threats associated with mobile devices can come in many forms, so there are a number of best practices one can put in place to thwart potentially disastrous consequences.
Google's open source programs manager launched a written tirade against mobile anti-virus companies, which he called "charlatans" and "scammers."
Apple on Wednesday issued much-anticipated updates for its Mac OS X and iOS mobile operating system, adding support for its new iCloud service, and fixing a bevy of security flaws.
Mobile botnets are nowhere near as big as PC zombie networks, but the threat is growing, according to a new report from Damballa.
Apple on Friday issued an update for its iOS mobile operating system, addressing a security flaw being used to jailbreak iPad, iPhone and iPod Touch devices.
As Apple devices gain more traction in the office, IT administrators must follow best practices to ensure these endpoints can be trusted.
Users may soon be able to run Flash within an app on an iPhone or iPad.
Sign up to our newsletters
SC Magazine Articles
- DDoS attacks enter new frontier with Portmapper
- John McAfee points to lone woman as Ashley Madison attacker while company offers reward
- Zero-Day, Angler kit exploits help drive up malvertising by 325%
- Judge grants father in custody case access to ex-wife's Facebook profile
- IBM: Corporations could be the next target for ransomware attacks
- Dark website Agora closes over Tor vulnerability suspicions
- Audit report finds sensitive data at risk for at least 73 Callif. agencies
- License plate reader helps spot Virginia killer, but privacy issues remain
- DD4BC are DDoS attack driving force, new report claims
- Researchers uncover possible Iranian-backed phishing scam