Browsing Tag: apple

Cross-Platform Flaws a Boon For Attackers

Categories: Apple, Microsoft

Attackers and malware writers, like many other people, tend to specialize, honing their skills in one particular discipline in order to maximize their chances for success. But Microsoft researchers have come across a series of malware samples and exploits that show that some attackers are beginning to target the same vulnerability across multiple platforms as a way to make the most out of their efforts.

Read more...

In First Black Hat Talk, Apple Reveals Little New About iOS Security

Categories: Apple, Mobile Security

LAS VEGAS–An odd thing happened at Black Hat on Thursday: an Apple security official gave a talk. Seats began filling early, 20 minutes before the talk began, and expectations were high, with many people wondering how much the speaker would reveal about the inner workings of iOS security. And then the talk began and it was fairly clear that the answer to that question was, not much.

Read more...

Mac Security: How Threats Against OS X Have Escalated

Categories: Apple, Malware

In this special edition Threatpost editor-in-chief Dennis Fisher talks with founding editor, Ryan Naraine about Mac security. They discuss why it took longer for the security community to understand the vulnerabilities of the Mac and when these conversations started. You’ll hear how cybercriminals are targeting OS X more than ever before and what you need to know to protect yourself from an attack.

Read more...

Apple Receives NFC Patent, But Takes It Slow with Mobile Payments

Categories: Mobile Security

Apple was granted a patent on Tuesday by the United States Patent and Trademark Office for a Near Field Communications (NFC)-enabled travel management application, furthering speculation that the company is readying mobile payment technology for future versions of its iPhone product.

Read more...

Dalai Lama’s Birthday Used As Bait In Targeted Attacks

Followers and supporters of Tibetan Buddhist leader the Dalai Lama were the targets of an e-mail borne attack that used news of the spiritual leader’s birthday to trick recipients into installing a surreptitious monitoring program on their computers.

Read more...

Five Years Later, the iPhone’s Legacy is Secure

Categories: Apple, Mobile Security

It’s nearly impossible to remember now, but there was a time when the iPhone didn’t exist. That time was five years and one day ago, and up to that point the idea of standing in line overnight for a mobile phone was almost as ridiculous as the notion of Apple being thought of as an innovator in security. But the former is now commonplace and the latter is straight fact, if only in discussions about the iPhone.

Read more...