New Apple malware is undetectable, unstoppable, and can infect any Thunderbolt-equipped device

Thursday, January 8th, 2015

Apple products have long enjoyed a reputation for superior security in relation to Windows systems, but a new proof-of-concept malware delivery method could put a serious dent in that reputation. The exploit, dubbed Thunderstrike, currently can’t be detected or removed by any known process without using specialized hardware. Security researcher ...

How to Ensure Your Home Router Has the Latest Security Updates

Monday, December 22nd, 2014

Keeping your home router updated is a crucial part of staying secure. Shellshock affected a number of routers, and we’ve also seen routers hacked and turned into botnets. Home router security is notoriously poor. You should ensure your router is getting security updates, too. Depending on your router, you may have to do this ...

800 Million Apple Devices at Risk, No Jailbreak Necessary

Thursday, November 6th, 2014

A piece of Apple-focused espionage malware dubbed WireLurker has been uncovered that, unlike most iPhone bugs, can compromise even non-jailbroken iOS smartphones and tablets—potentially putting 800 million devices at risk. Apple operating systems, once seen as a more secure alternative to Windows and Android, have been faced with increasing numbers of ...

Badly secured routers leave 79 percent of US home networks at risk of attack

Thursday, November 6th, 2014

As many as four out of five internet-connected households in the US could be at risk of attack through their wireless router. This is among the findings of a study by security specialist Avast which found that more than half of all home routers are poorly protected using default or easily ...

Strengthening 2-Step Verification with Security Key

Tuesday, October 21st, 2014

2-Step Verification offers a strong extra layer of protection for Google Accounts. Once enabled, you’re asked for a verification code from your phone in addition to your password, to prove that it’s really you signing in from an unfamiliar device. Hackers usually work from afar, so this second factor makes ...