|
Data Security Viruses, Firewalls and Safe computing |
![]() |
| LinkBack | Thread Tools | Rate Thread |
| ||||
Weaponizing Apple's iPod Touch Written by Daniel Friday, 07 August 2009 Security expert converts popular music/movie player and browsing device into a penetration testing, hacking tool Aug 05, 2009 | 03:02 PM By Kelly Jackson Higgins DarkReading It fits behind a coffee machine, inside a desk drawer, or in your pocket, and it doesn't arouse suspicion if you walk into a bank or office tapping away on it -- and that's why a security expert has turned an iPod Touch into a full-blown hacking tool. [Front page...]
__________________ "Though all men live in ignorance before mystery, they need not live in darkness... Justice is foundation and Mercy ETERNAL." DKE "All that we do is touched by Ocean Yet we remain on the shore of what we know." Richard Wilbur [img]/forum/attachments/random-nonsense/16515-sigs-dan_drag.jpg[/img] Subscribers! Ask Pitch about a Custom Sig Graphic |
![]() |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | |
Rate This Thread | |
| |
![]() | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Ipod touch and Itunes | captaincurran | OS, Software, Firmware, and BIOS | 6 | 18th March, 2008 02:48 PM |
Where are Apple's missing iPhones? | Daniel ~ | Mobile Devices and Networking | 0 | 25th January, 2008 08:06 PM |
Apple's 802.11n software now available | danrok | Mobile Devices and Networking | 0 | 31st January, 2007 03:28 AM |