Fraudsters are capitalizing on the trusted names of two major smartphone providers to spread malware.
Apple this week issued an update to address rampant concerns that its iPhone and iPad devices are collecting and storing information about users' locations.
Apple has denied logging users' locations and promised to release a software update to change the way it stores data on iPhones.
Google and Apple are facing heat from U.S. and foreign lawmakers over the discovery that their smartphone and tablet devices are collecting and storing information about users' locations.
Anonymous location data being collected off smartphones is nothing new, but some privacy experts worry about the implication if law enforcement wants access to it.
Apple released a number of security updates for Mac OS X, Safari and iOS.
Will 2011 be the year that threats against Mac platforms and devices finally reach the tipping point? Yes, according to a number of security firms.
A lot of threats already seen on PCs and laptops will move to mobile systems, a panelist said at SC World Congress in New York.
As Apple devices gain more traction in the office, IT administrators must follow best practices to ensure these endpoints can be trusted.
Users may soon be able to run Flash within an app on an iPhone or iPad.
The widespread threat presented by mobile devices may not be imminent, but the warning signs are there.
An explosion in smartphones, laptops, USB sticks and other portable devices has brought new security challenges, reports Greg Masters.
A just released annual report from Intego said it has been a busy year for Apple security.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context