Google is a smart organization. It has watched the stranglehold that Apple has over its users and has decided that it likes it. Just like art imitates life, Google imitates Apple (and then says “who me?”). The issue at point is a bug found in the WebView rendering engine, used in all Android releases prior […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
FireEye , a security research firm, recently disclosed an interesting attack against iOS devices. Apparently, iOS allows a rogue iPhone app to replace a genuine iPhone app. Once that rogue app is now installed, it can do anything the real app could do – PLUS send a copy of your banking credentials Moscow or Kiev […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Yes, this is for real. Russian entrepreneurs have figured out there is a market for this. According to an article in ITWorld, there is a business in hacking iCloud accounts. Get the password by some means and then using EPPB from Elcomsoft, the hacker can grab just pictures or contact or messages – just what […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It was reported yesterday that there are undocumented services in iOS that allow someone to bypass all of Apple’s security and encryption features. The researcher did not say that either Apple or the NSA were using these features, but…. The researcher, Jonathan Zdziarski, reported his findings at the HOPE/X conference in New York. According to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]