The file-sharing utility Dropbox is now offering two-factor authentication, a system that makes it much harder for hackers to capture valid credentials for a person's account. Dropbox, one of the most widely used web-based storage ...
Tags: Dropbox, Security, Authentication
A new piece of malicious software targeted at Apple users has been found on a website dedicated to the Dalai Lama. The malware, nicknamed “Dockster,” is a backdoor that allows an attacker to control the victim’s ...
Tags: Apple, botnets, Dockster, highlightedpost, malware, Web attacks
Apple retained the top spot in a survey released by the American Consumer Satisfaction Index, which also found that the tablet market is spurring PC makers to improve the quality of their products. The satisfaction rate for computers, ...
Tags: Apple, top spot, customer satisfaction
With the Apple iOS 6 upgrade launch, the company's first turn-by-turn navigation program, simply called "Maps," is now available for iPhone and iPad and included with the iPhone 5. Full of promise, Maps has been subject to much criticism ...
A vulnerability in Oracle's Java software that attackers can use to remotely seize control of systems running the program is being sold for"five digits". The security hole is being sold by an established member of an ...
Tags: Oracle, Java zero-day exploit, MidiDevice, sold for'five digits'
The iPhone 5 is producing a higher volume of web traffic than the Samsung Galaxy S III,after less than three weeks on the market. That's according to research by Chitika Insights which monitored web impressions of the two devices and ...
Tags: Iphone 5, Samsung Galaxy S III, Chitika Insights, touchscreen
On the smart-phone battleground, much attention has been paid recently to the quality of the free navigation app--Apple Maps--that comes with the new iPhone 5 (also part of the iOS 6 upgrade available for some other Apple devices). But ...
Tags: Smart-Phone Navigation, Google Maps navigation, Apple Maps
The CEO of a small Florida publishing company has suggested that it was the source of a leak of one-million-plus Apple users'personal details,which hacking group Anonymous had attributed to the compromised Dell laptop of FBI agent ...
Claims that 12 million unique device identifiers(UDIDs)of Apple iPads were hacked from the laptop of an FBI agent have been rebutted by the US law enforcement organisation. The FBI–which has its own Twitter feed–initially ...
Tags: FBI, Apple iPad UDID leak, 12 million unique device identifiers