Security News Stream, Page 2 ▼

California Kill Switch Bill Has Been Signed Into Law

08/25/2014, Earlier this year we mentioned how the California Senate had passed the bill that would make it a requirement for smartphone OEMs to include kill switches in their devices. Well it looks like the law will finally come into effect by 2015, thanks to...

Tor Claims Network Was Breached, University Researchers Suspected

07/31/2014, For those unfamiliar with Tor, it is basically a service in which Internet users can use to cloak themselves in a shroud of anonymity. While it does sound shady (and rightfully so, given that many of Silk Road’s users were using Tor), it does have more...

Russia Wants Apple & SAP To Turn Over Their Source Codes

07/31/2014, As you’re probably aware by now, China is not the biggest fan of Microsoft and has accused the company of anti-monopoly activities and also to a certain extent, spying. Well it looks like Russia too has fears about spying, although not necessarily from...

German Government Chooses BlackBerry For Its Security

07/29/2014, Several years ago, the idea of using an Android phone or an iPhone as a government or corporate device seemed a little ludicrous. This is thanks to the fact that back in the day, BlackBerry devices were at the forefront of mobile security, and thanks to...

Malware Discovered On Facebook Masquerading As A YouTube Video

07/23/2014, Let’s face it, whenever we see a sexy photo or video pop up on our Facebook News Feed, we get curious, especially if the title is extremely engaging, but it looks like there has been a piece of malware making its rounds on Facebook. According to an...

Apple Denies iOS Backdoor Access Claims

07/22/2014, Just yesterday we reported that according to a security researcher, he had discovered that Apple had installed several backdoors in iOS that made it easy for someone with the right tools and knowledge to gain access to a person’s iOS device. It was...

Apple Patent Describes Using Behavioral Habits To Enhance Security

07/18/2014, The way we all use our phones differs from user to user. For example some of us like to constantly kill off all running apps every hour, some of us like to keep Bluetooth enabled, and the way we type things and send messages will also differ from user to...

Apple Brings Two-Step Authentication To 48 More Countries

07/17/2014, With credit card information usually being linked to iTunes, and with your iTunes credentials allowing you to track your iPhone and disable it remotely, it’s safe to say that keeping your account secure would be a priority. Well the good news is that if...

Jailbreaker Geohot Joins Google’s Project Zero’s Team Of Hackers

07/17/2014, A couple of days ago, Google announced Project Zero which is basically Google’s plan to keep the internet safe. This is done by keeping an eye out for potential vulnerabilities across all sorts of software and platforms, and then helping the developers...

BlackBerry Not Threatened By Apple-IBM Partnership

07/17/2014, Just yesterday, Apple and IBM announced that they would be partnering up in a bid to bring iOS into the enterprise space. This will be done by creating over a 100 industry-specific apps, as well as tailor some of Apple’s services, such as iCloud, for...

Hackers Deliver Malware Through Japanese Adult Websites

07/17/2014, Visiting adult websites is a pretty common occurrence but the next time you are thinking about visiting Japanese adult websites, you might want to rethink that. This is because according to a recent report by ESET, it seems that cyber criminals have...