Apple in pictures
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users.
The Pentagon's decision to grant Apple the security clearance required for iOS 6 devices to go head-to-head with BlackBerry 10 and certain Samsung Galaxy S4 devices on secure military networks could have with a cascading effect that spills over into the private sector.
Mr. Cook goes to Washington, an Apple Store grows in San Francisco, and Mac spyware turns up in Norway. The remainders for Thursday, May 16, 2013, are going global.
Previously unknown Mac OS X spyware, signed with a valid Apple Developer ID, has turned up on the laptop of an activist from Angola at a human rights conference in Norway.
Mirror, mirror on the wall, what browser blocks malware best of all? The answer to that question is Microsoft Internet Explorer 10, at least according to the latest test results released by NSS Labs.
If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen.
Reader Richard Patterson finds his way blocked when trying to launch a favorite application. He writes:
If you're planning to sell or give away your iPad, then it is essential that your personal information and data be erased from it. If it's running sluggish after a few years, sometimes backing up your data, erasing it from the tablet and restoring it might improve performance.
Apple yesterday gave its strongest signal yet that it will continue to support OS X Snow Leopard with patches for the foreseeable future rather than retire the still-active operating system.
Perhaps you are already an iOS master. Or maybe you consider yourself more of a novice. Either way, we feel confident that at least some of the tips and tricks for iOS 6 that we present below will be new to you. What's more, we hope you love them--and benefit from them--as much as we do.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
Sign up now »
Get identity and password proliferation under control, reduce helpdesk costs and extend secure, single sign-on access to any enterprise application with a single solution.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.