Thursday, January 8th, 2015
Apple products have long enjoyed a reputation for superior security in relation to Windows systems, but a new proof-of-concept malware delivery method could put a serious dent in that reputation. The exploit, dubbed Thunderstrike, currently can’t be detected or removed by any known process without using specialized hardware. Security researcher ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Monday, December 22nd, 2014
Keeping your home router updated is a crucial part of staying secure. Shellshock affected a number of routers, and we’ve also seen routers hacked and turned into botnets. Home router security is notoriously poor.
You should ensure your router is getting security updates, too. Depending on your router, you may have to do this ...
Posted in Hardware, Internet, Networking, Security | No Comments
Thursday, November 6th, 2014
A piece of Apple-focused espionage malware dubbed WireLurker has been uncovered that, unlike most iPhone bugs, can compromise even non-jailbroken iOS smartphones and tablets—potentially putting 800 million devices at risk.
Apple operating systems, once seen as a more secure alternative to Windows and Android, have been faced with increasing numbers of ...
Posted in Hardware, Mobile, Privacy, Security | No Comments
Thursday, November 6th, 2014
As many as four out of five internet-connected households in the US could be at risk of attack through their wireless router.
This is among the findings of a study by security specialist Avast which found that more than half of all home routers are poorly protected using default or easily ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Tuesday, October 21st, 2014
2-Step Verification offers a strong extra layer of protection for Google Accounts. Once enabled, you’re asked for a verification code from your phone in addition to your password, to prove that it’s really you signing in from an unfamiliar device. Hackers usually work from afar, so this second factor makes ...
Posted in Hardware, Internet, Privacy, Security | No Comments