From BYOD and social media to ergonomics and encryption, Tech Pro Research has dozens of ready-made, downloadable IT policy templates.
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
Your new post is loading...
|
Gust MEES's curator insight,
July 4, 2013 6:45 AM
The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.
Gust MEES's curator insight,
July 4, 2013 6:48 AM
The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.
Zhao KQiang's curator insight,
March 27, 2014 6:52 AM
there is one example of smart phone security. focus on the mobile system Android |