Newsfeed Archive
News & Highlights
(Source: Fortune) A newly discovered security feature in Apple’s upcoming mobile operating system could boost user data security—and make it harder for police to find …
Read More
News & Highlights
(Source: The Merkle) RICHMOND, Mass., Sept. 7, 2017 – Rivetz Corp. (“Rivetz”), a leading provider of mobile, decentralized security solutions for business customers worldwide, …
Read More
News & Highlights
(Source: Chandigarh Metro) India’s telecom giant and 4G internet service provider, Reliance Jio tied up with Norton to offer best comprehensive mobile security solution to its consumers by …
Read More
News & Highlights
(Source: SYS-CON Media) New research from Avast, the global leader in digital security products, reveals an uptick in attacks targeting Android smartphones and tablets in Q2/2017 of …
Read More
News & Highlights
(Source: Graham Cluley Security News) Of course, not all software flaws qualify. Those with no security impact, that require a physical connection to a device, or that necessitate extensive user …
Read More
News & Highlights
(Source: XDA Developers) The company prides itself in how secure their software is (even when it’s built on top of Android) and they were even able to release their software update before …
Read More
News & Highlights
(Source: Naked Security) .. remains in dispute between Cisco Talos researchers and the software giant. … A specially crafted web page can cause a content security policy bypass …
Read More
News & Highlights
(Source: GuruFocus.com) Cavium™, Inc. (NASDAQ: CAVM), a leading provider of semiconductor products that enable secureand intelligent processing for enterprise, data center, wired …
Read More
News & Highlights
(Source: BleepingComputer) Cisco has initiated a mass security audit of all its products that incorporate a … all the software products for four Apache Struts security bugs disclosed last week.
Read More
News & Highlights
(Source: Wccftech) Security researchers believe that this bug could allow hackers to perform malicious actions by tricking AV software that blindly rely on a particular Windows API.
Read More