Apple has once again reiterated its claim that it is technically impossible for it to access encrypted data on iPhones that are running iOS 8 or higher and even if it was possible, it would be apprehensive to perform such an action.
Thinking of using the cloud, but have doubts whether it’s secure enough? You are not alone. Many enterprises hesitate to fully embrace it, fearing that their sensitive data might get compromised when stored online. But is the risk really high or can it be managed?
Sony Pictures Entertainment says that it will pay out $8 million to its employees, over a data breach last year. The studio was attacked by cybercriminals over the release of the movie The Interview.
Earlier this year, a new type of trojan caught the attention of ESET researchers. This article will take a deep dive into how the exploit works and briefly describe the final payload.
It has been claimed that the director of the CIA has had his personal email account breached by a teenager, with social engineering playing a part in the hack.
Vulnerabilities that have been found in LTE networks leave Android devices open to a DDoS attack, according to the Computer Emergency Response Team Coordination Center (CERT/CC) at Carnegie Mellon University.
A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a Flash vulnerability leaked in the Hacking Team hack and the so-called unicorn bug, a vulnerability in Internet Explorer.