Google: 80% of Android apps encrypt traffic by default
Slow progress on encrypting Android app communications, but it's finally picking up pace.
Slow progress on encrypting Android app communications, but it's finally picking up pace.
Google’s top payouts for Android now match Apple’s iOS top tier.
And while you’re at it ditch all your unsupported hardware.
FTC uses consumer protection powers to impose tough restrictions on the makers of stalkerware apps.
But according to Cisco this is not a critical bug because attacks are localized to the virtual OS instance.
You know toddlers: The more expensive and precious an object is, the more likely they'll grab it. My 15-month-old daughter loves nothing better than to get her drooly little hands on my iPad--and when she does, she (naturally) skips the PBS Kids and Barney apps and makes a beeline for Safari and my Mail inbox. Great.
Ben Patterson | 14 May | Read more
Perhaps you are already an iOS master. Or maybe you consider yourself more of a novice. Either way, we feel confident that at least some of the tips and tricks for iOS 6 that we present below will be new to you. What's more, we hope you love them--and benefit from them--as much as we do.
Dan Moren and Lex Friedman | 07 Feb | Read more
These days, it is almost impossible to meet someone who doesn't own a cell phone. More specifically, smartphones, whether it be the trendy iPhone, corporate favored Blackberry or modern Windows Mobile, almost everyone has joined the smartphone frenzy -- and with good reason. A smartphone offers more advanced computing ability and connectivity than a contemporary phone.
Spencer McIntyre | 05 Nov | Read more
In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then called iPhone OS) were many of the security features that modern-day desktop software has as a matter of course, such as data-execution protection (DEP) and address-space layout randomization (ASLR). Apple's cachet lured security researchers to test the platform, and in less than a month, a trio had released details on the first vulnerability: an exploitable flaw in the mobile Safari browser.
Robert Lemos | 06 Jun | Read more