InfoSec Favorites

« Work Out the Bugs in Your Information Security | Main | Tips to Avoid Phishing Scams »


Feed You can follow this conversation by subscribing to the comment feed for this post.

Kim Mayes

Have similar malicious apps been found on the Apple Iphone and Ipod Touch devices?

jeff gibson


I found this article that will answer your question and provide some examples of some proof-of-concepts relating to the iPhone.

The comments to this entry are closed.