Security Researcher Mohamed Osman Saeed has found a long series of critical vulnerabilities in major websites but he could not participate to any bounty program because he lives in the sanction country Sudan. Security Researcher Mohamed Osman Saeed has found a long series of vulnerabilities in major websites. He declared to have found an XSS flaw in 2 IBM Site’s ( […]
After a weekend of outage and various mysterious password reset emails Apple has revealed that the iOS Developer Center was hacked. After 3 days of absolute silence of the voice of a possible hack to the IOS Developer Center, Apple has just confirmed that it was the victim of a cyber attack. The iOS Developer Center web […]
US law enforcers suggest a kill switch for mobile devices to principal manufactures and Apple adapts. The idea of US law enforcers is the realization of a kill switch on mobile devices that would be used in case of theft. New York’s top prosecutor, State Attorney General Eric Schneiderman, and San Francisco District Attorney George Gascón promoted […]
The top-secret PRISM project claims direct access to servers of major IT corporates including Google, Apple and Facebook. The recent news on the control of communications made by the US Government through the PRISM program has literally left bewildered public opinion, everyone imagined it but when the Population has been confronted with the evidence remained shocked. […]
Mactans charger, this is the name of the malicious charger that will be presented by researchers at the Black Hat 2013 conference in July that is able to inoculate a malware in any Apple iOS devices. Researchers from the Georgia Institute of Technology announced the creation of Mactans charger, a custom wall charger for Apple iPhone and iPad […]
iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to the iCloud to store their data such as photos, music and documents and Apple has tried recently to improve their security introducing in March a two factor authentication system … Do users really know the security mechanisms that […]
F-Secure published the Mobile Threat Report for Q1 2013 that reveals Malware targeting Android devices is rapidly growing in both the number of variants detected and in their complexity and sophistication. F-Secure has published the Mobile Threat Report for Q1 2013, an interesting document that the security firm periodically issues giving information on the evolution […]
Apple can “bypass the security software” if it chooses, accoring ATF no law enforcement agency could unlock a defendant’s iPhone except Apple that has created a police waiting list because of high demand. Apple is considered an impregnable fortress, the main functions provided by the iOS operating system and related data are inaccessible to ill-intentioned but […]
Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular of its famous Apple store that according the Researchers Elie Bursztein was vulnerable for more than half year. The developer supported Apple to discovery and fix an important vulnerability that allowed to steal passwords and […]
It’s a very difficult period for security researchers that in the last months have discovered various cyber espionage campaigns that hit governments, private businesses and intelligence agencies all over the world. The situation is very concerning, silently cyber threats attacks the above institutions to steal sensitive information and intellectual properties causing damage comparable to those […]