In Pictures: 10 tips to secure your iPhone
No more is it enough to think that securing your iPhone with a simple 4 digit PIN is adequate.
29 Jan | View galleries
iPhone and iPad will be offered an Apple alternative to easy Google and Facebook log in options.
The easily exploitable FaceTime eavesdropping bug has caught the attention of law makers.
Apple and Facebook were at odds, blocking Facebook from running internal iOS apps after it was revealed that Facebook was using su
David Braue | 04 Feb | Read more
State sponsored hackers from the US working in the Middle East reflect on the joys of having a fresh exploit for iPhones.
China suggests Donald Trump use a phone made by Huawei, the company banned from Australian and US 5G networks.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
Tom Kaneshige | 20 Jun | Read more
Perhaps you are already an iOS master. Or maybe you consider yourself more of a novice. Either way, we feel confident that at least some of the tips and tricks for iOS 6 that we present below will be new to you. What's more, we hope you love them--and benefit from them--as much as we do.
Dan Moren and Lex Friedman | 07 Feb | Read more
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
Ellen Messmer | 10 Dec | Read more
Increasingly, businesses accept the idea that employees should be able to use their personal mobile devices, such as smartphones and tablets, for work. But debate is raging as to whether these employee-owned devices should be managed and secured exactly as corporate-owned devices might be.
Ellen Messmer | 28 Jul | Read more
In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then called iPhone OS) were many of the security features that modern-day desktop software has as a matter of course, such as data-execution protection (DEP) and address-space layout randomization (ASLR). Apple's cachet lured security researchers to test the platform, and in less than a month, a trio had released details on the first vulnerability: an exploitable flaw in the mobile Safari browser.
Robert Lemos | 06 Jun | Read more