Mactans charger, this is the name of the malicious charger that will be presented by researchers at the Black Hat 2013 conference…
iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to…
F-Secure published the Mobile Threat Report for Q1 2013 that reveals Malware targeting Android devices is rapidly growing in both…
Apple can "bypass the security software" if it chooses, accoring ATF no law enforcement agency could unlock a defendant's iPhone except…
Once again the security of large scale application and platform is challenged, today is the turn of Apple, in particular…
It’s a very difficult period for security researchers that in the last months have discovered various cyber espionage campaigns that…
Java, Java and once again Java, the popular framework and its vulnerabilities are becoming a really nightmare for security experts,…
When Apple revealed the hack to Reuters press agency I wrote that the last big enterprise not yet hacked was…
There is no peace for enterprises, in few weaks we have discovered how much vulnerable are giants of IT, one…
Another blow was dealt to the authorities by a group of hackers linked to Anonymous that claims to have breached…
This website uses cookies.