Is the iPhone amenable to any method of email encryption? If not, what secure email features are present or in the works?
Media processing errors can be exploited by an attacker by passing malicious files. A successful attack could allow a person to gain access to critical files.
Calling Apple's Mac OS X one of the easiest operating systems to crack, a security researcher demonstrated several methods to hack into a system and execute arbitrary code to take full control of a computer.
Apple update fixes 46 iPhone security holes, but iPod Touch owners have to pay. Sophos urges iPhone and iPod Touch users to update to version 3.0 to ensure Internet browsing security.
The new virus infecting jailbroken iPhones is the most serious virus to date; Sophos cracks password for infected iPhones.
Symantec has issued a warning to inform users about cybercriminals using the new iPad's hype to target consumers looking for information on Apple's new gadget.
Using fuzzing techniques, researcher Charlie Miller has found vulnerabilities in Microsoft, Apple, and Adobe software.
With its continued increase in popularity, the so-called good security of Apple is about to get tested when the dangers of using Apple technology rise with it.
Apple devices are going to be under the scope of would be attackers along with smartphones and tablets.
Fourteen people have been arrested for allegedly using stolen credit and debit card information; Apple releases yet another set of security fixes.
Accelerating the Deployment of the Evolved Cyber Range
Ixia BreakingPoint creates an Internet-scale cyber range environment from a single 7-inch-high device for arming and training cyber warriors. Learn how BreakingPoint can be used by organizations to defend national interests by assessing, educating, and certifying elite cyber warriors and equipping those forces to harden the resiliency of critical network and data center infrastructures.
A Six-Step Plan for Competitive Device Evaluations
This paper presents a six-step methodology for conducting competitive product evaluations that provide advance insight into the performance, security, and stability of devices within production network and data center environments. Following this will give insights on how to evaluate and select the network or security devices for Enterprise, Federal, and Carrier Infrastructures
A Case Study of Eurograbber: How 36 Million Euros was Stolen via Malware
This is a case study about a sophisticated, multi-dimensional and targeted attack that stole an estimated 36+ million Euros from more than 30,000 bank customers from multiple banks across Europe.
Symantec, Singapore school partner to nurture next-generation security talents
Symantec Corp. and the Singapore Management University will jointly train and equip IT security professionals with the latest knowledge and skill sets in information security.