mobile device
Secure Your iPhone: Exploring Stolen Device Protection
In this episode, host Tom Eston provides a detailed explanation of the ‘Stolen Device Protection’ for iPhones – a new security feature by Apple. This feature triggers enhanced security factors such as ...
AirTag Stalking – Murder, Fear and Litigation
At the end of January 2022, Akron, Ohio resident Heidi Moon was staying in a hotel in Kent, Ohio when her ex-boyfriend texted her, indicating that he knew where she was. Four ...
Amazon Sidewalk, Apple AirTag and Involuntary Sharing
If you own an Amazon device (Ring, Echo, Dot, Plus, Show, Spot, Studio, Input or Flex) then starting this week, you may be sharing at least some attributes of your device with ...
Security Vs. Convenience: Navigating the Mobile World
The emergence of COVID-19 vaccines has offered the UK light at the end of the pandemic tunnel. However, even with an increasingly vaccinated workforce, it remains unlikely that we will witness a ...
Jailbreak or Jail – Is Hacking for the Government A Crime?
After the horrific shooting in San Bernardino, California, federal law enforcement officers seized the now-dead suspect’s iPhone, and sought to examine it. However, the phone was “locked” using proprietary hardware and software ...
Tips From a Hacker to Keep Smartphones Safe
We can do many things using our mobile devices: hail a taxi, book a hotel, send and receive money, purchase goods online or in-store, chat and share media files, control other devices ...