Apple always cared about the safety of its customers. The company has been able to create a full-fledged multi-level system to protect its hardware and software ecosystem and protect its customers in recent years. Unfortunately, the system is not without its shortcomings.
Sean M. Thompson decided to talk about the legal incentives for spying on employees in this article. The decision to control is complex for a variety of reasons: cost, culture, confidentiality, perception, etc. The goal is to balance corporate security needs with employee privacy concerns. The advantages of monitoring are well known – the visibility of employees’ actions, the protection of assets, the knowledge of threatening behavior, etc. There are five general categories of government regulations that impose positive obligations on monitoring employee behavior.
Smartphones are so much absorbed into our lives that we cannot imagine life without them. For some, the phone just a means of communication, but for someone a lifetime. Most of us hold a lot of information in their devices from the important dates of birthdays of close to bank accounts.
This report is an in-depth technical look at a targeted espionage attack being actively leveraged against an undetermined number of mobile users around the world. Lookout researchers have done deep analysis on a live iOS sample of the malware, detailed in this report.