After celebrity Web 2.0 journalist Mat Honan had all his iDevices remote-wiped by a cybercrook last year, Apple's login security has been under scrutiny.
Good news! Apple has finally bitten the bullet and started offering two-factor verification for Apple ID users...
iOS 6.1.3 has only just been released by Apple, and already a security hole has been followed - allowing anyone to bypass the passcode lock on iPhones, and access private data on the device.
Anyone else getting a sense of Deja Vu?
Apple has just released iOS 6.1.3, an operating system update for iPhones and iPads that is said to fix a high profile flaw that could potentially allow someone to bypass your device's lock screen.
Computer users should be getting used to security updates for Adobe Flash by now - after all, this is the fourth in as many weeks.
Make sure your computers are protected as soon as possible.
The White House agrees with the 114,000+ US citizens who signed a petition to make cell phone unlocking legal.
What they didn't address: the legality of jailbreaking and rooting.
Technology journalist Mat Honan and Cloudflare CEO Matthew Prince have something in common - they've both been hacked by the UGNazi hacktivist group.
And what they told the RSA Conference spells bad news for those of us who love to use the internet and embrace cloud-based technologies in our personal and work lives.
You too can get into somebody's locked iPhone, particularly if you have a prehensile tail and don't mind (almost) placing a phony emergency call. Which you a) probably don't and b) hopefully do.
On January 26, US citizens lost the right to unlock their mobile phones. On Thursday, a requisite number of disgruntled people had demanded that the administration examine the issue of giving them back that right.
Conference season 2013 is on. While events like these can be great for networking and mindsharing, there can be computer security dangers lurking about. We've pulled together 8 IT security tips to help you stay ahead of the game.
A warning spreads on Facebook about "Talking Angela", an app that gives your children some animated cat chat.
Malheureusement, it's all too simple for people to share warnings - rather than check if the facts are true.
Malicious hackers could create a boobytrapped TIFF image file and either trick a BlackBerry smartphone user into visiting a webpage carrying the image, or embed the malicious image directly into an email or instant message...
..and plant malware on your enterprise server.
The US Department of Defense is funding the development of a hardware peripheral and software suite that turns a regular smartphone into a device that scans and transmits biometric data at distances not possible for current scanning technology.