iOS security loophole allows access to passcode-protected iPhone

iOS security loophole allows access to passcode-protected iPhone


iOS security loophole allows access to passcode-protected iPhone

Posted: 26 Oct 2010 08:59 AM PDT

A security hole in Apple iOS 4.1 allows anyone to bypass the passcode screen and access certain functions of the iPhone. To do that, you must hit the "Emergency Call" button when faced with the pas...

Bredolab botnet beheaded

Posted: 26 Oct 2010 07:24 AM PDT

Botnet takedowns have become a common occurrence this year, and the last one to be hit is Bredolab. Counting some 30 million bots and nearly 150 command and control centers, it was one of the biggest ...

Iranian Cyber Army behind TechCrunch Europe hack?

Posted: 26 Oct 2010 06:34 AM PDT

Political hacking might give the perpetrators a sense of accomplishment and some personal satisfaction, but will rarely bring them money. Since they obviously already have the knowledge, it is very li...

.com is the most dangerous domain

Posted: 26 Oct 2010 06:13 AM PDT

The world's most heavily trafficked web domain, .COM, is now the riskiest, according to McAfee's "Mapping the Mal Web" report released today. Fifty-six percent of all risky sites end in .COM. McA...

A closer look at Watchmac

Posted: 26 Oct 2010 06:00 AM PDT

Watchmac (v.1.6) is a handy piece of software that will tell you if someone has fiddled with your laptop while you were gone - moved it, removed its battery or unplugged its power cord - not to mentio...

Fabric weaves security into program code

Posted: 26 Oct 2010 05:09 AM PDT

Wouldn't it be wonderful if we could build security into a program as it is written? This idea spurred a number of researchers from Cornell University to try and develop a new platform and a new langu...

Breaking web browsers

Posted: 26 Oct 2010 05:05 AM PDT

In the video below, Jeremiah Grossman, the founder and CTO of WhiteHat Security, talks about breaking web security. The video was recorded at the OWASP AppSec USA 2010 conference. ...

80% of firms don't know who should secure cloud data

Posted: 26 Oct 2010 04:31 AM PDT

The cloud is still akin to the Wild West when it comes to the security of the data hosted there, according to Courion. In fact, 1 in 7 companies admit that they know there are potential access viol...

One-touch secure access to corporate data

Posted: 26 Oct 2010 04:01 AM PDT

Check Point announced its new Mobile Access Software Blade that delivers fast and secure access to corporate email, data and business applications from mobile devices. It integrates advanced SSL VPN c...

Twitter phish targets users with huge following

Posted: 26 Oct 2010 12:36 AM PDT

A link that will supposedly take users to a page where they can use a "mobile" version of Twitter has been popping up here and there in a number of chatrooms over the weekend. Sunbelt's Chris Boy...

0 comments:

Post a Comment