Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


TeamViewer issues emergency fix for desktop access vulnerability

The dangerous bug allowed attackers to seize control of PCs through desktop sessions.

TeamViewer issues emergency fix for desktop access vulnerability

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: FBI: We're Still Using the San Bernardino iPhone Cracking Method & Won't Share  (Read 57 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 23076
  • .: Surf Queen
    • WWW
FBI: We're Still Using the San Bernardino iPhone Cracking Method & Won't Share
14 March 2017, 4:49 pm

The FBI is refusing to release information about the tool it used to break down the encryption levels around the iPhone of the San Bernardino shooter because it might still have use for it. 

There was a huge scandal last year as Apple said it could do absolutely nothing to help the FBI crack the iPhone used by the San Bernardino shooter. It wasn't long before the FBI said it no longer needed Apple's help because it managed to crack the device on its own. How? They didn't say and continue to refuse to share any information about it. 

The government is currently fighting against three news organizations who want the FBI to release information about how it unlocked the passcode-protected phone of Syed Farook.  There have been ample speculations in regards to this issue, including the fact that they may have outsourced the case. 

"Disclosure of this information could reasonably be expected to cause serious damage to national security ... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included ¬© 2006 - 2017 Smokey Services‚ĄĘ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks