Apps on iOS 6 will require explicit permission to access personal data

Apps on iOS 6 will require explicit permission to access personal data


Apps on iOS 6 will require explicit permission to access personal data

Posted: 18 Jun 2012 10:31 AM PDT

Users of Apple devices equipped with the upcoming iOS version 6 will be explicitly warned when the app they are trying to install asks permission to access their contacts, calendars, reminders and the...

Democratic govts not immune to censorship attempts, says Google

Posted: 18 Jun 2012 08:36 AM PDT

Judging by the numbers contained in Google's latest bi-annual Transparency Report, governments and government officials around the world have lately been approaching the Internet giant with content ta...

The dangers of NOT passing cybersecurity legislation in 2012

Posted: 18 Jun 2012 07:15 AM PDT

According to the U.S. Government, cyber-security protection of critical infrastructure is a national priority. With 85 percent of the nation's critical infrastructure owned and operated by the privat...

Unpatched IE flaw actively exploited in the wild

Posted: 18 Jun 2012 07:10 AM PDT

When Microsoft released a security advisory detailing a critical flaw in Microsoft XML Core Services and its corresponding "Fix it" mitigation solution last week, it made sure to note that it was awar...

Six arrested for peddling Android malware in Japan

Posted: 18 Jun 2012 05:11 AM PDT

Six men - among which are three IT executives - have been arrested in Japan for having allegedly used Android malware to "earn" themselves over 20 million yen (around half a million US dollars) from u...

Vulnerabilities in open source WAF ModSecurity

Posted: 18 Jun 2012 05:00 AM PDT

During our research of web application firewall evasion issues, we uncovered a flaw in ModSecurity that may lead to complete bypass of the installed rules, in the cases when ModSecurity is deployed to...

Increase in cyber threats and sabotage on critical infrastructure

Posted: 18 Jun 2012 04:50 AM PDT

The Pacific Northwest National Laboratory (PNNL), in conjunction with McAfee, revealed a report that fully examines the current challenges facing critical infrastructure and key resources as well as i...

US-CERT warns of Intel CPU flaw

Posted: 18 Jun 2012 03:39 AM PDT

A flaw in Intel chips leaves users of a number or x64-based operating systems vulnerable to system hijacking, the US Computer Emergency Readiness Team warns. "Some 64-bit operating systems and vi...

Highest paying IT certifications

Posted: 18 Jun 2012 02:30 AM PDT

ISACA's Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) credentials have been named two of the highest-paying IT certifications in the lates...

Real life examples on hackers bypassing CAPTCHA

Posted: 18 Jun 2012 12:18 AM PDT

Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A CAPTCHA, or a Complet...

Predicting Malicious Behavior

Posted: 17 Jun 2012 09:45 PM PDT

Predicting Malicious Behavior combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Writ...

Week in review: Link between Flame and Stuxnet discovered, and cracking LinkedIn passwords

Posted: 17 Jun 2012 09:00 PM PDT

Here's an overview of some of last week's most interesting news, reviews and articles: Lessons learned from cracking 2 million LinkedIn passwords Like everyone this week, I learned about a huge ...

0 comments:

Post a Comment