As Apple continues to open more and more doors to developers and third parties, these types of vulnerabilities are going to become more prevalent. Security best practices apply to all mobile devices including your iOS phones and tablets. Do not fall prey to the idea that Apple is impervious to attack or breach.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page
Comments