• cloud,  iPhone,  Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment,  sites,  Social Networking

    Link Baiting 101

    I almost called this article “Aliens Can Listen To Calls on Your iPhone” or “How To Hack Into Every iPhone Ever (Even When They’re Powered Off)”. But then I thought that maybe it would be a bit too much. I’ve been a little melodramatic at times, but that’s when I was younger and needed the rupees. But TechTarget isn’t young (although I don’t know if they need the rupees). I’d like to point out two recent articles of theirs: Zaphod wrote this chapter just to mess with you: Apple iOS Security Attacks A Matter Of When, Not If, IT Pros Say The Salmon of Doubt would be a much better title…

  • iPhone

    iPhone Worm is Crap

    Sorry, I can’t help it. That whole “iPhone Security Problems” thread I’ve seen on a few sites recently due to that worm. Oh, then there was a second worm that did the same thing. Really? Did these awesome security gurus realize that the device has to be jailbroken? Oh and they have to still have the default password used for SSH? I would hope that if you know enough to jailbreak the device without bricking it that you know enough to change the default SSH password. Interestingly enough though, an estimated 6 to 8 percent of iPhones are jail-broken… If there have been 21 million sold, that provides an attack…