1. Security
    June 3rd, 2015 by Macworld Australia Staff
    UEFI flaw makes many Macs vulnerable

    A newly discovered flaw has been found by a security researcher. It allows an attacker to install malware that can persist even after all data on the hard drive has been erased. The...

  2. Security
    June 2nd, 2015 by Glenn Fleishman
    Wearable security: two-factor authentication apps for Apple Watch

    The Apple Watch could become our central hub in a wheel of identity, in which all spokes rotate around our wrist. Some early Watch apps already have a high degree of utility. But we’re...

  3. Security
    May 28th, 2015 by Anthony Caruana
    SMS attack crashes iOS devices

    An SMS messaging attack that instantly crashes iOS devices when you open a message has been discovered by some Reddit users. The message is a specific string of Arabic characters that...

  4. Security
    May 25th, 2015 by Anthony Caruana
    Bluetooth LE could be a security risk

    It’s fair to say the Apple Watch and a number of other small devices would not be possible without the recent development of Bluetooth LE, or BLE. This is a low- energy Bluetooth...

  5. Security
    May 15th, 2015 by Glenn Fleishman
    When security products don’t actually make you safer

    I hate to poke holes in good faith efforts to improve the integrity and security of individuals’ and businesses’ data, but, in just the last week, I’ve seen three separate efforts...

  6. Security
    April 28th, 2015 by Lucian Constantin
    Second HTTPS snooping flaw breaks security for thousands of iOS apps

    Attackers can potentially snoop on the encrypted traffic of over 25,000 iOS applications due to a vulnerability in a popular open-source networking library. The vulnerability stems...

  7. Security
    April 23rd, 2015 by Anthony Caruana
    1500 flawed iOS apps in App Store

    Researchers from security firm SourceDNA have found 1500 apps in the App Store that suffer from an SSL validation issue discovered in an open source library. Although the library was...

  8. Security
    April 21st, 2015 by Anthony Caruana
    Dead apps an enterprise risk

    It happens to all of us – there’s an app you like but after some time the developer either abandons the app or they stop updating it, having replaced it with something new. Evernote...

  9. Security
    April 20th, 2015 by Anthony Caruana
    Macs still vulnerable to “Rootpipe”

    Late in 2014, a security flaw, dubbed “Rootpipe”, was identified. This gives root access to attackers. Root access gives greater access to low level processes and files that are...

  10. Security
    April 20th, 2015 by Anthony Caruana
    iOS users more easily phished than Android

    According to a report by security firm ThreatSim, about 8% of clicks on phishing emails come from iOS with just 2% coming from Android. The research went further, finding 16% of iOS...

  11. Security
    March 24th, 2015 by Mike Elgan
    The business behind Apple’s gigantic Apple Watch rollout

    The Apple Watch may or may not be an impressive piece of design or technology. But one thing is certain: Apple’s preparations for retail sales of the watch are amazing. Let’s...

  12. Security
    March 20th, 2015 by Michael Cooney
    IBM: Mobile app security environment currently vulnerable

    Major weaknesses in mobile application development make enterprise data vulnerable to attack. That was the major conclusion from an IBM/Ponemon study released last week which found...

  13. Security
    March 16th, 2015 by Jeremy Kirk
    Google error leaks owner personal info for nearly 300,000 websites

    A Google software problem inadvertently exposed the names, addresses, email addresses and phone numbers used to register websites after people had chosen to keep the information private....

  14. Security
    March 13th, 2015 by Macworld Australia Staff
    Parallels webinar: Find out how to maximise the Macs in a Windows environment

    Did you miss the Parallels webinar on 27 February? Now’s your chance to find out the latest on practical solutions for controlling and managing the Macs in your business. The webinar...

  15. Security
    February 6th, 2015 by Maria Korolov
    New iOS spy app listens in to conversations

    A new front has opened up in the Operation Pawn Storm cyber-espionage operation – an iOS app that spies on users, up to and including secretly turning on the phone’s microphone...

  16. Security
    December 16th, 2014 by Anthony Caruana
    Protecting your tech during the holidays

    Your business relies on technology. Whether it’s for the accounts program, point of sale system or just email and scheduling, losing your computer or a server can spell big trouble...

  17. Security
    November 22nd, 2014 by Anthony Caruana
    Data security pitfalls – Five things you need to know

    Over the last couple of years, the IT security landscape has changed in some very significant ways. Criminal gangs and nation states are now responsible for many security breaches and...

Contact us