Tags: macRemove, symantecRemove

Symantec's Morpho misstep 
By Tony Campbell | Jul 14, 2015 | Comment Now 
[Blog post] What's in a name?
 
Microsoft releases Office for Mac, but only on cloud 
By Tony Yoo | Jul 10, 2015 | Comment Now 
Following 100,000 feedback messages.
 
Morpho hackers hit Apple, Microsoft for corporate data 
By Allie Coyne | Jul 9, 2015 | Comment Now 
Cyber gang stealing sensitive info from big business.
 
Symantec poaches Oracle exec to head Australia 
By Tony Yoo | Jul 8, 2015 | Comment Now 
Six-month search ends with Ian McAdam.
 
Duqu spyware used stolen Foxconn certs  
By Eric Auchard, Joseph Menn | Jun 16, 2015 | Comment Now 
Attackers target hardware manufacturers to steal digital credentials.
 
Apple Macs vulnerable to EFI zero-day 
By Juha Saarinen | May 31, 2015 | Comment Now 
Attackers can insert EFI rootkits from userland.
 
User mistakes aid most cyber attacks 
Apr 14, 2015 | Comment Now 
Verizon, Symantec reports reveal popularity of phishing attacks.
 
Apple phases out dual-boot support for Windows 7 
By Juha Saarinen | Mar 23, 2015 | Comment Now 
Newer Macs will dual-boot Windows 8 or later only.
 
Microsoft previews Office 2016 for Mac 
By Juha Saarinen | Mar 6, 2015 | Comment Now 
Aims to unify Windows and OS X productivity suites.
 
Symantec ordered to pay for patent infringement 
Feb 9, 2015 | Comment Now 
Hit with $21.8 million in damages.
 
Apple pushes first ever automated security update to Macs 
Dec 24, 2014 | Comment Now 
Fix for critical NTP vulnerability in OS X.
 
US-CERT issues alert for Regin state-sponsored malware 
 
The failure of the antivirus industry 
By Juha Saarinen | Nov 26, 2014 | Comment Now 
[Blog post] Insights from AVAR 2014.
 
Google releases enterprise anti-malware tool for Macs 
By Allie Coyne | Nov 25, 2014 | Comment Now 
"Santa" software arrives in time for Christmas.
 
Regin state-sponsored malware traced to UK, US spies: report 
By Juha Saarinen | Nov 25, 2014 | Comment Now 
Used in surveillance on EU, Belgian telco.
 
Building a better case for resilience 
Nov 24, 2014 | Comment Now 
How to include IT and commercial consideration in your business resilience plan.
 
Backdoor trojan discovered stalking high-profile targets 
Nov 24, 2014 | Comment Now 
Compared to Duqu and Stuxnet.
 
Original Apple to go under the hammer 
Nov 4, 2014 | Comment Now 
Computer sold by Jobs from family garage.
 
Mac OS X Yosemite sends search, location data to Apple, Microsoft 
By Allie Coyne | Oct 21, 2014 | Comment Now 
'Spotlight Suggestions' also featured in iOS 8.
 
Apple unveils new iPads, 5K display iMac and Mac Minis 
By Juha Saarinen | Oct 17, 2014 | Comment Now 
Highest resolution screen so far.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 773

Vote