August 7, 2015 New Mac Security Threats: The Perfect Storm? 2 min read - Mac security is under fire thanks to a pair of new and potentially damaging vulnerabilities: Thunderstrike 2 and file-system zero-day exploit.
May 8, 2015 Apple Security Updates Shake Bugs Out of Safari’s Tree 2 min read - New Apple security updates target a number of critical bugs in the Safari browser, specifically those exploiting its open-source WebKit.
May 3, 2015 Mobile Threat Report: Dead Apps Walking? 2 min read - Dead apps now pose a serious threat to enterprise security, according to a new mobile threat report. What can companies do to avoid these mobile zombies?
April 27, 2015 New iOS 8 Vulnerability Taps Worrisome Wi-Fi Exploit 2 min read - A new type of iOS 8 vulnerability combines WiFiGate and an SSL compromise to cripple iPhones, according to mobile security firm Skycure.
Software Vulnerabilities April 21, 2015 CVE-2015-1097: Deobfuscating iOS Kernel Pointers With an IBM X-Force-Discovered Vulnerability 4 min read - IBM's X-Force Application Security Research Team has discovered a memory disclosure vulnerability in iOS IOKit IOMobileFrameBuffer.
January 6, 2015 iDict Creator Claims Tool Was Meant to Make Apple Improve iCloud Security 2 min read - A cybercriminal claims the iDict tool was only created to force Apple to deal with a vulnerability in iCloud that allowed brute-force attacks.
November 18, 2014 Mobile Apps Security: You’ve Got Mal(ware) 2 min read - According to the recent "State of Mobile Apps Security" report, popular iOS and Android apps have been hacked, highlighting the need for boosted security.
November 11, 2014 Masque Attack Switches iOS Apps With Malicious Duplicates 2 min read - The so-called Masque attack lures iPhone users to update their favorite apps, then replaces those apps with identical but malicious imitators.
November 10, 2014 WireLurker iOS Trojan May Be Apple’s Worst Nightmare 2 min read - A Trojan that security researchers have dubbed WireLurker infects Macs running OS X and then steals information on iOS devices after connecting via USB.
Application Security November 4, 2014 Common Techniques to Hack Mobile Apps and How to Mitigate Those Risks 3 min read - Cybercriminals use the following tools and techniques to hack mobile apps. Here's how you can harden and protect an application against run-time attacks.