Tag Archives: iPhone

iPhone X

With all the buzz about the new iPhone…

Posted in Security Blog | Tagged , , , , , | Comments Off on iPhone X

60% of BYOD Users Use the Same Device to Download Pirated Content

In a recent poll in the UK, sixty percent of users who use their personal device for accessing corporate data, also use the exact same device to download pirated content off of ‘bad sites’ that are usually laden with nudity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on 60% of BYOD Users Use the Same Device to Download Pirated Content

The First iPhone Hacker Built a Self-Driving Car in his Garage

George Hotz says he built a self-driving car in a month. George was the first person to hack an iPhone and a Playstation. He has a great philosophy on the AI that drives the self-driving car.

Posted in Security Blog | Tagged , , , , , | Comments Off on The First iPhone Hacker Built a Self-Driving Car in his Garage

How Long Is Your PIN? IT DOESN’T MATTER!!!!

I can’t fathom setting up and memorizing a PIN as long as the person in this video has. Sometimes, no matter how secure you think you are by enabling encryption on your iPhone and using an ultra-long PIN number… Your … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on How Long Is Your PIN? IT DOESN’T MATTER!!!!

Convenience Traded for Privacy: Samsung Televisions

Cool new technologies like the Samsung voice controlled television, are a great convenience. They are also a huge window for the Samsung company to get into your homes. When you enable voice control, all noises are transmitted to Samsung and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Convenience Traded for Privacy: Samsung Televisions

Fake Cell Phone Towers & CryptoPhone

Seventeen fake cellphone towers were discovered across the U.S. last week. They were discovered by using the CryptoPhone, an Android-based secure mobile phone with 360° mobile device security for secure messaging and voice over IP communication on any network. “What … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Fake Cell Phone Towers & CryptoPhone