Apple


Exodus Intelligence Security Firm offers up to $500,000-dollar bounty for security exploits

One way companies are now attempting to discover vulnerabilities in their software or products, is to offer a bounty for any exploits that are found in their software by any third party’s. This is a good way for companies to motivate the public to actively search out exploits. These exploits […]


Apple Devices Vulnerable to Hackers

Many iOS devices could be vulnerable to a specific issue called the  “masque” attack. This basically allows hackers to get into your phone and hijack traffic, as well as disable communication between apps. The way to acquire the malware is through a third party app installer. Many companies use this to install apps […]