eSIM: what is it for?
Recently Samsung introduced the Gear S2 Classic 3G smart watch, which is the first device with eSIM support. Although it is a pilot, this technology is bound to spark a
123 articles
Recently Samsung introduced the Gear S2 Classic 3G smart watch, which is the first device with eSIM support. Although it is a pilot, this technology is bound to spark a
Over the past week-plus, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in the San
When find yourself caught in the eye of the storm, you might have problems understanding what has really happened. While stuck in a traffic jam, you would never know it
I would like to start this week’s new edition of Security Week with news that has nothing to do with information security. Volkswagen diesel vehicles happened to be emitting far
A worm was found in the safe garden of Apple. About 40 iOS apps are now being cleaned out of the App Store because they turned out to be infected
“Three billion human lives ended on August 29, 1997. The survivors of the nuclear fire called the war Judgment Day. They lived only to face a new nightmare: the war
Our lives will be smooth once PCs are embedded into our brains. Text messages will be replaced by ‘mentalgrams,’ whispered to us subtly by our inner voice. Has a bright
What a dreadful week this one has been for the infosec industry, my friends. Following an amusing week of discovering bugs, zero-days and other researcher-coveted curios, here comes the painful
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
A researcher has developed a nasty bootkit capable of taking complete control of Mac OS X devices. Here is what you need to know.
Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your child’s iPad.
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Yesterday, researchers disclosed a powerful iOS vulnerability that is responsible for the WireLurker Apple malware.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
Virus Bulletin is a traditionally enterprise-focused event, but each year topics of consumer interest, like Apple malware, hackable devices and Bitcoin are presented.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.