The CIA has been working with security researchers to hack into Apple’s technology since long before we all carried Apple devices around in our pockets.
The story lays out in detail how, for nearly a decade now, the CIA has been working on ways to penetrate Apple’s iPhones and iPads, in order to collect data on Apple customers, which Apple CEO Tim Cook has publicly and repeatedly vowed to protect. Researchers have been targeting Apple’s security keys, which encrypt user data, as well as working on their own version of Apple’s software development tool, which would give the intelligence community access to any apps.
Read moreA lot of security vulnerabilities were reported every day in 2014. The number of vulnerabilities discovered each year in operating systems, applications, and hardware has skyrocketed in a nasty trend, according to analysis by GFI Software.
The top spot for vulnerabilities in operating systems no longer goes to Microsoft Windows. 2014 was a tough year for Linux users from internet security point of view, coupled with the fact that some of the most important security issues of the year were reported for applications that usually run on Linux systems. GFI said the worst offender in 2014 for having security flaws was third-party applications.
Read moreWhen throwing tantrums kids should be given time to calm down on their own rather than distracted with smartphones and tablets. It might be tempting to hand over an iPad to a screaming child when all else has failed to calm them down.
But child psychologists say it may be stunting youngsters' emotional development, because they do not learn how to control their emotions. Researchers found that children need to find ways of self-regulating their feelings rather than masking them with distracting programmes or games. It has been noticed that increased television time decreases a child's development of social skills and language.
Read moreBeing informed is being protected! Safeum Communications ehf. has released a new mobile application TOP Security! for you to stay tuned on the latest security news.
You will learn about latest trends, threats, data leaks and vulnerabilities in popular applications and services. News, analysis, interviews and expert forecasts – we monitor the news and immediately share with you. The most relevant and interesting events and expert opinions are assembled for you. User-friendly menu allows you to sort the news by tags, set up notification settings and change the interface language.
Read moreHe says iPhone has special software that allows the government to spy on you. The Edward Snowden insecurity wagon stopped late last week in Russia for just long enough to scatter tales of wide-open iPhone hardware and easily cored user credentials.
Snowden's lawyer told reporters in Russia that he does not use an iPhone. We assume that he does not use a lot of common or open means of communication these days, because he worries about what it means for his liberty. Snowden, who is currently enjoying Russia as his home, does not have time to use the popular phone, and is unlikely to ever make time.
Read morePersonal data protection has been one of the trending topics for the past few years. However, all people perceive it differently: someone thinks of governmental control, others do not want to become the victims of online frauds.
Being informed is being protected! Safeum Communications ehf. has released a new mobile application TOP Security! for you to stay tuned on the latest security news. You will learn about latest trends, threats, data leaks and vulnerabilities in popular applications and services. News, analysis, interviews and expert forecasts – we monitor the news and immediately share with you.
Read moreA new patent filing describes using the cloud to transfer your Touch ID fingerprint data to other devices. Would such a system be safe and secure? Apple has envisioned a technology that would sync your Touch ID data with other mobile devices, as well as point-of-sale systems, via iCloud.
The sensor requires your fingerprint to access the device and to make purchases using the Apple Pay payments system. Setting up Touch ID is a matter of registering one or more fingerprints on your device. Why would Apple propose a cloud-based system for this process? How would this proposed syncing technology safeguard your Touch ID data?
Read moreApple Inc has pushed out its first-ever automated security update to Macintosh computers to help defend against newly identified bugs that security researchers have warned could enable hackers to gain remote control of machines.
The company pushed out the software to fix critical security vulnerabilities in a component of its OS X operating system. Carnegie Mellon identified dozens of technology companies, including Apple, whose products might be vulnerable. When Apple has released previous security patches, it has done so through its regular software update system, which typically requires user intervention.
Read moreHow many secrets do you think your iPhone can reveal to strangers? Even when it’s in your hands, placed on the table, or being charged from a laptop it can reveal quite a few — from personal correspondence and photos, to financial information and credentials. So how do you protect yourself? Well, you can follow our tips in order to maximize your iPhone security.
Keep in mind that doing everything we mention here will deprive your iPhone of some of its helpful features, but at the same time it will better protect your private data. You don’t have to follow all of the tips, so feel free to choose what you’re ready to sacrifice for the sake of security — it’s completely up to you.
Read moreData released from a consumer security risks survey found that nearly a third of participants are casual when making online transactions. This action leads to security vulnerability of financial data at risk and poses problems for banks and e-payment systems if they have to refund their clients’ losses.
The study was conducted through an online survey from May to June this year with users from 23 countries. Though users are worried about cyber threats, they still do little to protect themselves. Shocking data shows that children are the most vulnerable Internet users, which poses as a danger for parents.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland