Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

Android Adware Infects 36.5M Devices via Google Play

What is believed to be one of the largest malware campaigns on Google Play Store has been discovered by security firm Checkpoint who claims that around 36.5 million Android devices were infected with ad-ware.

Android Adware Infects 36.5M Devices via Google Play

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Apple downplays importance of CIA's iPhone hacking capabilities  (Read 19 times)

0 Members and 1 Guest are viewing this topic.

ScarlettTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: Cymru
  • Posts: 22235
Apple downplays importance of CIA's iPhone hacking capabilities
14 March 2017, 11:49 pm



In a massive data dump last week, Wikileaks released thousands upon thousands of highly secretive and sensitive CIA documents which detail the extent of the government agency's spying tools. Aside from interesting tidbits regarding the CIA attempting to eavesdrop on targets via Samsung HDTVs, the leaked documents also reference the CIA's efforts to hack into iOS devices.

In fact, the CIA even has a specialized team devoted entirely towards coming up with security exploits for iOS devices, and in particular the iPhone. Even though the iPhone only accounts for less than 15% of global smartphone marketshare, Apple's iconic smartphone attracts a disproportionate amount of attention because it's proven to be quite popular among "social, political, diplomatic and business elites."

To read this article in full or to leave a comment, please click here



Source: Network World Security

>> To obtain the full NetworkWorld Security article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle