Stories by Tony Bradley

Mat Honan Hack Pokes Holes in Apple iCloud

The hackers that hijacked Mat Honan’s online life, took over his Twitter account(s), and wiped out his iPhone, iPad, MacBook, and Google accounts in one fell swoop showed some perseverance in achieving that goal. Not all attackers are quite that determined, but the hack still demonstrates some serious flaws in Apple’s iCloud and the iCloud security model.

Tony Bradley | 08 Aug | Read more

Can Congress Protect the Nation's Critical Infrastructure?

The nation's critical infrastructure is at risk--a well-executed cyber attack could have a potentially devastating effect. Congress is trying to patch some of the holes with legislation, but a recent survey found that most security experts have little faith that government regulation can do the trick.

Tony Bradley | 03 Aug | Read more

Mac OS X Targeted By Clever New Trojan

A new Mac malware threat has been discovered. The OSX/Crisis Trojan is an insidious clever threat. Mac users should take steps to defend against this new malware, and proactively defend against future threats while they're at it.

Tony Bradley | 27 Jul | Read more

What You Should Know About Grum and the Botnet Takedown

Grum--the third largest botnet in existence, and the source of nearly twenty percent of all spam traffic online--has been taken offline by authorities. In some ways the takedown is significant, but it may not change much in the grand scheme of things. Let's take a closer look at the botnet, and what the takedown means for all of us.

Tony Bradley | 20 Jul | Read more

Patch Tuesday Includes Shocking Update for IE9

Time flies. More than half of 2012 has already passed, and now--with the Independence Day festivities behind us--we turn our attention to the seventh Patch Tuesday of the year. There are nine new security bulletins expected from Microsoft next week, including a critical update for Internet Explorer 9.

Tony Bradley | 05 Jul | Read more

Mobile Devices Are the New 'Wild West'

It all starts with a new frontier. Then, the pioneers come to explore and exploit the frontier, followed by settlers moving in to claim the frontier as their own. That brings on the "wild west"--a period with few rules, and rampant lawlessness.

Tony Bradley | 02 Jul | Read more

Why Apple's iOS 6 Privacy Protection Will Backfire

People don't like it when apps surreptitiously steal personal information. Apparently Apple's primary concern is the "surreptitious" part, though, rather than preventing personal data from being leaked or collected. New dialog boxes in iOS 6 may protect Apple, but will do little to help users safeguard their privacy.

Tony Bradley | 19 Jun | Read more