Apple Developer Site Breached
Two things happened last week: Apple developers began to receive unexpected password reset emails, and the Apple Developer center was shut down for maintenance. Everything pointed to a breach; but Apple said little.
More results...
Two things happened last week: Apple developers began to receive unexpected password reset emails, and the Apple Developer center was shut down for maintenance. Everything pointed to a breach; but Apple said little.
It’s a rite of passage for many college students to run for student government office – particularly if they have grander political aspirations. But some take it just a tad too seriously (think Tracy Flick in “Election”). Take, for instance, the case o…
It’s a rite of passage for many college students to run for student government office – particularly if they have grander political aspirations. But some take it just a tad too seriously (think Tracy Flick in “Election”). Take, for instance, the case o…
Just as a new report explains why Java vulnerabilities, despite Oracle’s best efforts, remain the hackers’ favored target, a Polish researcher discovers that the latest version, Java 7, is susceptible to a 10-year old attack.
Numericable is a cable TV company operating in France, Belgium and Luxembourg. Rex Mundi claimed to have stolen customer data and demanded €22,000 for its return. Numericable declined, and denied that the hackers had the data.
A brief statement from Tumblr late on Tuesday confirmed that its iPhone and iPad apps had been updated to patch “an issue that allowed passwords to be compromised [sniffed] in certain circumstances.”
The legality of Prism in the US is a question for Congress and the US courts, says Sir Malcolm Rifkind, chairman of the UK’s all-party Intelligence and Security Committee – but the acquisition of Prism data by GCHQ is done legally.
Malware authors are ever-adaptable, as evidenced by the rise of remote access tools (RAT) written in Java that are capable of running on multiple operating systems. The Android mobile operating system has made its way into the RAT crosshairs, with a ne…
The France-based mobile security specialist will participate in Japan’s leading IT innovation trade event to demonstrate its security solutions.
Spear-phishing is an attack that attempts to ensnare a specific individual or group of victims via email; water hole attacks wait for the victim to come to the trap. Attackers – especially state-sponsored attackers – are increasingly turning to the lat…