The Latest in IT Security

1

Most Trojans are basically the same: Having penetrated a device, they steal the owner’s payment information, mine cryptocurrency for the attackers, or encrypt data and demand a ransom.

Read more ...

1

Apple has published an updated version of its iOS security guide, in which it details features introduced in iOS 11.2 (released on December 4, 2017) and iOS 11.1 (October 31, 2017).

Read more ...

1

IOActive and Embedi researchers found 147 cybersecurity vulnerabilities in 34 mobile applications used in tandem with SCADA systems.

Read more ...

1

The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

Read more ...

Categories

WEDNESDAY, JANUARY 24, 2018

Featured

Archives

Latest Comments

Social Networks