Android apps are full of potential leaks, finds study

(Phys.org)—Many Android apps are capable of falling victim to Man in the Middle (MITM) attacks. How many? Far too many. Thousands of apps in the Google Play mobile market present vulnerabilities because of the way that ...

Georgia Tech uncovers iOS security weaknesses

Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, ...

House OKs cybersecurity bill despite veto threat

The House ignored Obama administration objections Thursday and approved legislation aimed at helping stop electronic attacks on critical U.S. infrastructure and private companies.

Apple out to kill widespread Macintosh virus

Apple said it is crafting a weapon to vanquish a Flashback virus from Macintosh computers and working to disrupt the command network being used by hackers behind the infections.

Hackers hitting Macs with virus: industry experts

The computer security industry buzzed Thursday with warnings that more than a half-million Macintosh computers may have been infected with a virus targeting Apple machines.

US Senate in new cybersecurity push

US senators, warning of potentially catastrophic cyberattacks, introduced a bill Tuesday aimed at protecting critical infrastructure such as power, water and transportation systems.

Georgia Tech releases cyber threats forecast for 2012

The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threatens to compromise content and erode public ...

page 1 from 9