Spoofed Apps—a New iOS Concern?
In the threat landscape, it can sometimes be difficult to classify if something should be considered a threat. Certainly, there are the blatantly obvious threats (read: malware) but there are some that merit discussion. One such example are “cloned” apps or “spoofed” apps. As the term suggests, “cloned” or “spoofed” apps are apps that resemble […] more…More information
- German Foreign Minister Says Russia will Face Consequences for Monthslong Cyber Espionage
- Einstein’s ‘spooky’ theory may lead to ultra-secure internet
- BlackBerry blacklists the ‘Pooh’ gang
- Facebook security chief Alex Stamos reportedly planning to leave
- Hackers gaining upper hand, security conference told
- Google Offering $250,000 for Full VM Escape in New KVM Bug Bounty Program
- Thousands of xHamster login credentials surface online
- WebAccess Performance testing during maintenance window of 12/9
- SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM
- Most IT pros do not trust cloud services with sensitive data