A couple of months ago I wrote about an iPhone bug that allows users to unintentionally install rogue iPhone Apps (see post). Well now Android users are getting hit with a similar attack. Ars technica is reporting that they have found an Android Installer hijacker (see article). Like the iPhone bug, it only works if […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Reuters is reporting that the Chinese government has removed a number of Western technology vendors products from the approved list. Whether this is due to Western surveillance or just due to their desire to support local companies is not clear – they are not saying. What they are saying is that Chinese companies “offer more […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Google is a smart organization. It has watched the stranglehold that Apple has over its users and has decided that it likes it. Just like art imitates life, Google imitates Apple (and then says “who me?”). The issue at point is a bug found in the WebView rendering engine, used in all Android releases prior […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to an article at Cult Of Mac, one of Apple’s suppliers, Quanta, posted Powerpoint documents with instructions on how to log in to a database containing confidential Apple documents on new, yet to be announced products. Apparently, the document contains default credentials, which it says, the business partner should change after they log in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to an article in Business Insider, Sharron Laverne Parrish, Jr. scammed Apple 42 times with a very simple scam. He presented debit cards on closed accounts for purchases – apparently in the thousands of dollars each. When the card was declined, he offered to call his bank and handle it. Except he was not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It was reported yesterday that there are undocumented services in iOS that allow someone to bypass all of Apple’s security and encryption features. The researcher did not say that either Apple or the NSA were using these features, but…. The researcher, Jonathan Zdziarski, reported his findings at the HOPE/X conference in New York. According to […]
Continue reading →
[DISPLAY_ACURAX_ICONS]