Search

Filter:

Search Results

Apple's iCloud breach: It's not just about naked photos

iPhone service appears to have let attackers use this method to guess passwords repeatedly without any sort of lockout or alert to the target. Once the password has been eventually matched, the attacker can ...

News Scan: Credit card firms, Apple team on mobile payments; LTE deployment accelerates; more

method of reaching target audiences without angering early adopters or driving away new users," says ...

Internet users' Holy Grail; How to use LinkedIn; More

(@forrester) September 2, 2014 And Finally...   A Google site meant to protect you is helping hackers attack ...

Backoff's victim count could be well over 1,000

some time for an organization to discover that they have been attacked. "Looking at the bigger ...

Bridging IT skills gap with 'citizen developers'; CIOs can now gauge who really reads their tweets; more

days can find out whether their tweets are being read or not. The dashboard provides a number ...

Report: Hackers plundered JPMorgan's networks for months

of the Cyber Statecraft Initiative at the Atlantic Council, tells the newswire. The attack shows "what ...

Flaw in Apple iCloud's Find My iPhone blamed for leak revealing celebrity photos

allegedly discovered in the Find My iPhone service appears to have let attackers use [a brute force attack ...

Mobile commerce to be worth $516B by 2017, predicts Digi-Capital

Mobile commerce, or m-commerce, will drive an estimated $516 billion in sales over the next three years, accounting for more than 70 percent of all mobile Internet revenue. That is the prediction of a new report from research firm Digi-Capital, which says that all mobile Internet revenue will top $700 ...

IT security pros look to SDN to bolster network security

to weekly phishing attacks Network security services are moving to virtual routers, Infonetics survey finds ...

E-commerce surge spurs demand for web application firewalls

interconnection model from many attacks types, such as DT, SQLI, XSS and RFI. WAF detects and blocks attempts ...