Victorinox, maker of the Swiss Army knife, has abruptly discontinued its security offering for the Swiss Army-branded line of portable USB memory sticks.
Is use of the Find My iPad app actually trespassing?
In what many would consider a bizarre case in Australia, an accused man says the evidence against him was obtained illegally when an iPad owner electronically tracked a stolen iPad via GPS to his property.
California’s Location Privacy Bill passes Assembly
Senator Mark Leno’s SB 1434, the Location Privacy Bill, has been passed by the California Assembly with a bipartisan vote of 63-11. Having now passed both chambers of the state legislature, the bill is headed towards Governor Jerry Brown.
Google’s new cloud Wallet – is it secure?
Earlier this month Google made some fundamental changes to the way in which Google Wallet operates. The main difference is that the ‘active’ part of payment has been shifted from the handheld device to Google’s servers; that is, the cloud.
Steps To Increase Your Smartphone Security
This is a guest post by Lucille J Cronk.The increasing use of smartphones and the reliance placed on it by smartphone users has made them the targets of many malicious activities. Their enormous storage capacity has given relief to our brains in trying…
Is Your Mobile Device Hacker-Proof?
This is a guest post by Alyse.If it’s connected to the Internet, it can be hacked. For years, this was mainly a concern to PC users and IT guys, but anything that achieves mainstream usage and market share will eventually attract black hat types. From …
90% leading paid mobile apps have been hacked
Arxan’s new study shows that more than 90% of top paid mobile apps have been hacked. App developers need to take note of this, and defend their own market.
DDoS and the collateral damage of hacktivism
Hacktivism cuts both ways. The biter gets bit, and a war evolves. Where there is war, there are weapons. And where there are weapons, there is collateral damage. There is a hacktivist war around Julian Assange, between his detractors and his defenders …
ESET analysis links the Quervar virus to the Induc virus
A detailed analysis of the Quervar.C virus, currently running amok in The Netherlands, shows similarities beyond the likelihood of coincidence with the pre-existing Induc.C virus.
Tesco to be investigated by the ICO
Tesco’s online security practices have been much questioned and criticized by security commentators over recent weeks. Now it appears that the Information Commissioners office is listening and acting, with reports that it will investigate.