newsbot
31-07-2009, 08:25 AM
No user interaction necessary
Black Hatย Researchers have uncovered a bevy of vulnerabilities in smart phones made by multiple vendors, including one in Apple's iPhone that could allow an attacker to execute malicious code without requiring the victim to take any action at all.โ€ฆ
Offloading malware protection to the cloud (http://whitepapers.theregister.co.uk/paper/view/696/smartprotection-whitepaper.pdf?td=rss)
**Hidden Content: Check the thread to see hidden data.**
Black Hatย Researchers have uncovered a bevy of vulnerabilities in smart phones made by multiple vendors, including one in Apple's iPhone that could allow an attacker to execute malicious code without requiring the victim to take any action at all.โ€ฆ
Offloading malware protection to the cloud (http://whitepapers.theregister.co.uk/paper/view/696/smartprotection-whitepaper.pdf?td=rss)
**Hidden Content: Check the thread to see hidden data.**