In his keynote address at a security conference, Apple co-founder Steve Wozniak admitted he has enjoyed many adventures in hacking often for the sake of pranks, especially in his college days and the early years of working on computers and the Internet.
Symantec this week announced two new data encryption options, one that is file-based encryption for use with Dropbox, and the second that works as an extension to the Apple iOS mail client to encrypt and decrypt documents.
Tablets, especially iPads, have become a way of life at the University of California, Irvine Medical Center, which now issues the tablets to incoming medical students.
A top Apple security guru presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted.
Google is close to a deal with the Federal Trade Commission to pay a record fine of $22.5 million related to violating the privacy of millions of Apple Safari users.
Law enforcement officers in New Mexico may soon be able to get important data -- such as criminal histories and license plate registrations -- directly through iOS and Android phones.
Look out, information technology managers: The era of "keep Macs out" is coming to an end.
There's great enthusiasm for using iPhones and iPads in the workplace, but experts interviewed by Network World say Apple's limited transparency about security issues can make enterprise adoption problematic.
In what could be regarded as a controversial test of anti-malware effectiveness, the influential Consumer Reports publication in its June issue gives its main recommendation to anti-malware freeware for protecting Windows and Mac computers.
RSA, the security division of EMC, plans to collaborate with several mobile and virtualization platform vendors to integrate RSA two-factor authentication and risk-detection technologies.
Companies are grappling with the question of whether and how to let employees use their own smartphones and tablets at work even as a huge push is being made to set up internal "app stores" of approved and custom-built corporate mobile apps.
Industry heavyweights Google, PayPal, Microsoft and AOL, along with 11 other companies, are aiming to eradicate phishing through technology.
A research team from the Georgia Institute of Technology says it has discovered a keyboard keylogger attack that can be done through a compromised iPhone. The same type of attack can be performed with other smartphones as well.
The hacker group that flagged a vulnerability on an Apple development website that could have led to phishing attacks against Mac OS X and iOS says that Apple has fixed the problem.
Apple's website for Mac OS X, iPhone and iPad developers has a vulnerability that could lead to phishing attacks, according to YGN Ethical Hacker Group.
Articles by Ellen MessmerNext Page