Encyption debate isn't going away
The fight over encryption isn't going away just because the FBI has figured out a way to glean the data off the iPhone used by a San Bernardino attacker.
The fight over encryption isn't going away just because the FBI has figured out a way to glean the data off the iPhone used by a San Bernardino attacker.
Security
Mar 31, 2016
9
12
The FBI's announcement that it mysteriously hacked into an iPhone is a public setback for Apple Inc., as consumers suddenly discover they can't keep their most personal information safe. Meanwhile, Apple remains in the dark ...
Security
Mar 29, 2016
4
8
Tax day is a little more than a month away, which means phishing season is in full swing.
Security
Mar 9, 2016
0
14
A local prosecutor has offered an unusual justification for forcing Apple to help hack an iPhone used by a San Bernardino mass killer: The phone might have been "used as a weapon" to introduce malicious software to county ...
Security
Mar 5, 2016
4
13
In its battle with Apple over an extremist's iPhone, the FBI says neither the company nor anyone else has anything to fear. Although they want to compel assistance from Apple to unlock a phone used by San Bernardino mass ...
Security
Feb 22, 2016
0
10
An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team. Details are reported in the International Journal ...
Security
Dec 7, 2015
0
11
Russian online security specialist Eugene Kaspersky says cybercriminals will one day go for bigger targets than PCs and mobiles, sabotaging entire transport networks, electrical grids or financial systems.
Security
Oct 3, 2015
0
65
A powerful new computer security tool, called XDet, can detect malicious files being uploaded to a cloud computing service is reported this month in the International Journal of Space-Based and Situated Computing by researchers ...
Computer Sciences
Aug 12, 2015
0
20
Marriage therapist Valerie Goss turned on her computer one day and found that all of her data was being held hostage.
Security
Feb 26, 2015
2
30
Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is ...
Security
Feb 10, 2015
2
43