|
|
|
|
Author |
Message |
news
Joined: 23 Apr 2007
Posts: 126360
|
|
Here's how an attacker could get an iPhone user to visit a malicious Web page in order to exploit a new hole in the device's browser, researchers say. Read this blog post by Elinor Mills on InSecurity Complex.
View the article
|
|
|
|
|
|
|
|
|
ivy00135
Joined: 06 Nov 2012
Posts: 49808
|
|
|
|
|
|
|
View next topic
View previous topic
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You cannot download files in this forum
|
|
|
|
|
|
|
|