Posts Tagged ‘iOS spyware’

Most Recent
 
Read More
2017-11-30

iOS 11 Horror Story

Apple always cared about the safety of its customers. The company has been able to create a full-fledged multi-level system to protect its hardware and software ecosystem and protect its customers in recent years. Unfortunately, the system is not without its shortcomings.

 

162
 
Read More
2017-09-24

Is it legal spying on employees

Sean M. Thompson decided to talk about the legal incentives for spying on employees in this article. The decision to control is complex for a variety of reasons: cost, culture, confidentiality, perception, etc. The goal is to balance corporate security needs with employee privacy concerns. The advantages of monitoring are well known – the visibility of employees’ actions, the protection of assets, the knowledge of threatening behavior, etc. There are five general categories of government regulations that impose positive obligations on monitoring employee behavior.

94
 
Read More
2017-01-06

Safe your mobile device from spyware

Smartphones are so much absorbed into our lives that we cannot imagine life without them. For some, the phone just a means of communication, but for someone a lifetime. Most of us hold a lot of information in their devices from the important dates of birthdays of close to bank accounts.

 

177
 
Read More
2016-08-27

Technical Analysis of Pegasus Spyware

This report is an in-depth technical look at a targeted espionage attack being actively leveraged against an undetermined number of mobile users around the world. Lookout researchers have done deep analysis on a live iOS sample of the malware, detailed in this report.

665
Latest Headlines
 
Read More
664
 
Read More
372
 
Read More
746

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics