Skip to main content

Researcher Reveals: All iOS Devices Allo...

JONATHAN ZDZIARSKI presented how all iOS devices are running Apple created, undocumented, hidden services, that allow access to all data on your device, even encrypted data.  His slides are available here.  Below I have summarized some of the more interesting parts and tried to put them in less technical terms. Highlights  Apple has worked hard […]

Read More

Breach at Goodwill Industries

Breach at Goodwill Industries

Breach at Goodwill Industries Credit card and ATM card info stolen Financial institutions across the country report that they are tracking what appears to be a series of credit card breaches involving Goodwill locations nationwide. For its part, Goodwill Industries International Inc. says it is working with the U.S. Secret Service on an investigation into these reports. According […]

Read More

June 2014 Cyber Attacks Statistics | Hac...

June 2014 Cyber Attacks Statistics | Hackmageddon.com

June 2014 Cyber Attacks Statistics | Hackmageddon.com. Paolo Passeri does an excellent job of breaking down the month of June’s attacks showing Daily Trend of Attacks Motivations Behind Attacks Distribution Of Attack Techniques Distribution of Targets Distribution of Targets Belonging to Industry All in great looking charts which I won’t repost here I believe you should visit […]

Read More