Before rushing into allowing employees to do their jobs on their personal devices, organizations need to diligently address the unique risks of that practice, cautioned a report by an international cybersecurity information organization.
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
![]() |
Gust MEES's curator insight,
July 4, 2013 6:45 AM
The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.
Gust MEES's curator insight,
July 4, 2013 6:48 AM
The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.
Zhao KQiang's curator insight,
March 27, 2014 6:52 AM
there is one example of smart phone security. focus on the mobile system Android |