About a year ago, Android users were fighting something called the Stagefright bug. Buried deep in the bowels of the operating system was a series of bugs that would allow an attacker to send you a specially crafted text message and take over your Android phone. Stagefright affected close to a billion phones in the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple was granted a patent last month that allowed someone to shut down photo and video recording on all nearby iPhones – say if you were photographing the police or a concert. The patent uses an infrared signal that would be received by appropriately equipped iPhones to disable the camera. Think about who might like […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
American Banker is reporting that banks are not terribly happy with their customer’s adoption (or not) of Apple Pay. This probably has less to do with anything that Apple did or did not do, but rather with the fact that people don’t deal with change very well. While 84% of the banks reported they were […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There is a lot of ink (digital ink that is) being spilled on the topic of ad supported content. The basic theory is that ad supported content allows you the reader to get a lot of content without having to shell out cash. Notice that I didn’t say the content is free. It is not. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Apple and the Department of Justice are not getting along these days. The DoJ wants Apple to feed them real time iMessage traffic for someone the DoJ is quietly investigating. Apple says that the way their system is designed, this is not possible. If the user stores their messages in iCloud, they can give the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Now that Apple is becoming a more mainstream IT player rather than just a consumer electronics vendor, hackers are starting to take more notice. Appthority, an application risk analysis and mitigation firm has announced Quicksand, an iOS vulnerability that allows malicious apps or anyone who can get physical access to an iOS device to steal […]
Continue reading →
[DISPLAY_ACURAX_ICONS]