| Trouble viewing this email? View in Browser | |
| |||||||||||||||||
| |
|
| |||||
|
| |||||
| ADVERTISEMENT | ||
| The US will utilize tools normally reserved for attacks on states like Iran and North Korea. | ||||
| In its heyday, SpyEye was used "by a global syndicate of cyber criminals" to infect more than 50 million computers. | ||||
| This time, they were able to get the passcode from the convicted defendant who owned the iPhone in question. | ||||
| The platform would need to securely handle a "cyptographically sound record of all transactions." | ||||
| |||||
| Follow us on Twitter: @securitywatch | |||
| |
| eNewsletter Information Click here to unsubscribe from this newsletter. To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here . | ||||
| ||||
No comments:
Post a Comment