A new study from Juniper finds that Android is the hardest hit by malicious apps but says iOS could be vulnerable as well. Android has gotten a lot of negative buzz for its susceptibility to malware. But a new study from Juniper Networks suggests that iOS could also be at…
Could a Cellphone Run on Sun? Not Really, Says Nokia
From June to September last year, five people in diverse environments around the world carried around special mobile phones made by Nokia. The prototypes were equipped with thin-film silicon solar panels on their back cover and a data logger to report harvested solar energy. View full post on cellphone security…
Could a Cellphone Run on Sun? Not Really, Says Nokia
From June to September last year, five people in diverse environments around the world carried around special mobile phones made by Nokia. The prototypes were equipped with thin-film silicon solar panels on their back cover and a data logger to report harvested solar energy. View full post on cellphone security…
‘They’ Really Are Watching You
Advertising networks, Web analytics companies and just about anyone else who’s interested can track your online activity thanks to the unique digital fingerprints your Web browser leaves at every site you visit. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security Gergory Evans
Are Apple products really more secure?
One thing I hear regularly when working in the computer security field are comments from Apple users along the lines of: “Why doesn’t everybody use Apple because there are no viruses for Macs?” or “All viruses target Windows because Windows sucks so bad” or “Microsoft is the target because Microsoft…
See just how “Security Aware” you really are
View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security Gergory Evans Gregory Evans | LinkedIn Interview With Gregory Evans Gregory Evans Security Expert Gregory Evans on Cyber Crime
With SSL, who can you really trust?
SSL requires that users rely on trusted third parties, but with some of those third parties compromised, researchers look for alternatives SSL, the encryption scheme that protects virtually all secure online transaction, requires that users rely on trusted third parties, but what if they can’t be trusted? Well, it turns…
LIGATT: The thing always happens that you really believe in; and the belief in a thing makes it happen~Frank Loyd Wright
LIGATT: The thing always happens that you really believe in; and the belief in a thing makes it happen~Frank Loyd Wright View full post on Twitter / LIGATT