Huge iOS, OS X Vulnerability Uncovered That Can Render Apps Unusable
Android might be targeted by hackers and malware far more often than Apple's iOS platform, but that doesn't mean devices like the iPhone and iPad…
Read MoreAndroid might be targeted by hackers and malware far more often than Apple's iOS platform, but that doesn't mean devices like the iPhone and iPad…
Read MoreThe National Security Agency's snooping practices may be costing American companies a lot of money. German publication Zeit Online has obtained leaked documents that purportedly show that…
Read MoreApple's App Store has a much better reputation for security than Google Play but that may not last long if more hackers take advantage of…
Read MoreWith secure email services such as Lavabit closing their doors, the fate of encrypted email may lie with the world's most infamous German-born New Zealand…
Read MoreRemembering passwords for multiple websites is incredibly annoying but it still might not be a good idea to let Google's Chrome browser remember them for…
Read MoreLess than a month after researchers at Bluebox Security uncovered the biggest Android security hole to date, Symantec has spotted two malicious apps that are taking…
Read MoreA security researcher in Germany claims to have discovered an encryption flaw in SIM cards that allow a user's cell phone to be hacked in…
Read MoreApple on Sunday said in an email to developers that a recent days-long developer portal outage was the result of a security breach in which…
Read MoreIt was discovered that the world's largest and most popular social networking site was inadvertently obtaining phone numbers from its users without their consent. Symantec…
Read MoreFury was building in Europe on Sunday as new leaks about NSA spying were published by various newspapers and magazines. Perhaps most notably, Der Spiegel…
Read MoreAlthough the Google Play store does a pretty good job of getting rid of apps that contain malware, it doesn't do nearly as well when…
Read MoreSpying claims are spreading and escalating across the globe, from Hong Kong to the United Kingdom. The latest big Guardian exposé claims that the U.K.…
Read MoreApple on Monday morning issued a public statement regarding customer privacy after having been named as one of several technology giants accused of cooperating with…
Read MoreThe latest Guardian bombshell reveals that NSA has gained access to several leading U.S. tech giants in a massive dragnet hoovering email, photo, filesharing and chat info from…
Read MoreIf you think Google Glass is creepy, just wait until you hear about the company's plans to develop "password pills." AllThingsD reports that Regina Dugan, the…
Read MoreAnyone developing malicious software for mobile devices has set his or her sights almost exclusively on Android at this point. Mobile security vendor NQ has…
Read MoreIf there's one thing that iPhone fans love to tease Android fans about, it's the perceived lack of security on Android devices. But AppleInsider points…
Read MoreOne downside of shifting to a post-PC world is the inevitable development and refinement of post-PC malware. Technology Review this week spoke with security researchers who say…
Read MoreCanadian government agency Public Safety Canada, which is tasked with overseeing cyber-security across all federal departments, has issued a memo warning government workers that communicating using BlackBerry…
Read MoreApple's (AAPL) latest iOS update is doing little to renew confidence in the company after a series of software snafus including the premature launch of…
Read MoreThis is one of the better ideas that Google's (GOOG) engineering team has concocted lately: a smartcard-embedded finger ring that uniquely identifies users on the web…
Read MoreBotnets used to be the exclusive domain of high-powered hackers looking to rake in cash from spam operations or to conduct highly effective DDoS attacks.…
Read MoreSmart TVs, particularly Samsung's (005930) last few generations of flat screens, can be hacked to give attackers remote access according to a security startup called ReVuln.…
Read MoreThe old phrase often credited to the late P.T. Barnum, "there's a sucker born every minute," can definitely be used to describe some aspects of…
Read MoreIt was bound to happen. Nokia (NOK) engineer Justin Angel outlined on his blog various tactics that can be used to pirate Windows 8 games distributed…
Read MoreYou don't need an Internet-connected smartphone to send out a tweet. In fact, very few people know that tweets can be sent out through a…
Read MoreTwitter users are reporting everywhere that their accounts have been compromised, reports TechCrunch. The tech blog says many users have received emails telling them to change…
Read More