May 2, 2017 New Mac Malware Targets User Communications 2 min read - A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.
Endpoint January 9, 2017 Bearing Fruit: The Future of Mobile Technology as Apple’s iPhone Turns 10 4 min read - Mobile technology buffs and analysts are hoping Apple will revolutionize the smartphone market once again 10 years after it released the first iPhone.
Endpoint December 28, 2016 Avoiding the Technology Upgrade? Don’t Dodge Security 4 min read - Consumers are buying new devices at a slow rate, but users who avoid the latest technology upgrade risk missing out on critical security updates.
December 8, 2016 Enforcement of iOS’s App Transport Security Is Problematic 2 min read - Despite Apple's plans to begin enforcing its App Transport Security standard at the start of 2017, many iOS app developers are still dragging their feet.
October 3, 2016 Mobile Security News Roundup: Top Stories From September 2 min read - September was another huge month for mobile security news. Headlines included new security features for Android devices and the launch of a $12,000 phone.
Endpoint September 7, 2016 iOS 10 and macOS Sierra: Five Factoids for IT 3 min read - As Apple prepares to release iOS 10 and macOS Sierra on Sept. 7, mobile technology enthusiasts are eagerly anticipating many exciting new features.
September 6, 2016 Apple Chomps on Critical Zero-Days With Emergency Mac Security Update 2 min read - Apple announced an emergency security update for OS X to address three zero-day flaws that allow cybercriminals to take total control of devices.
September 5, 2016 Mobile Security News Roundup: Top Stories From August 2 min read - August saw many shifts in the mobile security landscape, including several new launches, threats and other snippets providing insight into upcoming trends.
August 18, 2016 Proxy Connects Show Evidence of a Software Vulnerability 2 min read - A security researcher recently discovered a software vulnerability that allows attackers to exploit the way applications respond to HTTP CONNECT requests.
August 3, 2016 WPAD Leaks Could Mean Flood of URL Trouble 2 min read - WPAD is an easy way to grab proxy information and get browsers online. When it comes to security, however, this protocol doesn't make the grade.