February 14, 2012
Is the iPhone secure enough?
According to popular expert opinion, there are seven areas in today’s mobile devices where vulnerabilities can create security or privacy breaches. Nowhere is this more true than in the paragon of mobile digital success: the iPhone. Nothing short of a juggernaut, new versions of the quasi-ubiquitous device have all but evaded attempts at hacking it by consistently introducing innovative new features and by leveraging a strategy of built-in obsolescence.
Comments are disabled.
Post is locked.
It follows then that each of these areas corresponds to specific security controls, tactically building a ‘defense in depth’ approach to securing the iPhone for personal use. In practice, the original seven risk areas map to the following five safeguards:
1. The operating system
Posted by: pybadyfyto at
11:52 AM
| No Comments
| Add Comment
Avoid jailbreaking the phone. As Apple never tires of repeating, once jailbroken, it is exposed to a set of clear and present dangers that at least risk compromising the data stored inside.
Zotac MAG
Post contains 154 words, total size 2 kb.
9kb generated in CPU 0.0092, elapsed 0.0947 seconds.
33 queries taking 0.0881 seconds, 72 records returned.
Powered by Minx 1.1.6c-pink.
33 queries taking 0.0881 seconds, 72 records returned.
Powered by Minx 1.1.6c-pink.