iOS


Exodus Intelligence Security Firm offers up to $500,000-dollar bounty for security exploits

One way companies are now attempting to discover vulnerabilities in their software or products, is to offer a bounty for any exploits that are found in their software by any third party’s. This is a good way for companies to motivate the public to actively search out exploits. These exploits […]


Email Passwords Getting “Popped” in Seconds even in 2015?

Information Security has been a very hot topic for the past few years, especially in 2015.  Every single day you can read about a new security breach at businesses that you frequent.  There are nearly 300 security requirements or “controls” that many companies must adhere to, but for this article […]


Apple Devices Vulnerable to Hackers

Many iOS devices could be vulnerable to a specific issue called the  “masque” attack. This basically allows hackers to get into your phone and hijack traffic, as well as disable communication between apps. The way to acquire the malware is through a third party app installer. Many companies use this to install apps […]