Much like a horror movie in which a close nit group of friends steal something for a good time only to open Pandora's Box, the story behind how Apple's iBoot source code leaked plays out similar to the plot of 28 Days Later.
David Cohen explores the cause and impact of jailbreaking and provokes some best practice to help the C-Suite get on top of the pervasive and risky behaviour.
Iphone malware around for ten months and over 100 apps compromised
In this week's In Case You Missed It (ICYMI): IBM warning over masterful Shifu, Carphone Warehouse attack was a wake-up call, KeyRaider targets jailbroken iPhones, pre-empt the EU and safeguard data now, and thousands of vulnerable Android apps found with new scanner.
Here are the five most popular articles, as read by you the reader, in the week for August 22 to 28.
First step, identify jailbroken devices on your network, says Vince Arneja, then alter data processing and execution modes to protect your data.
Two senior security researchers have detailed how hackers can use "touchlogging" attack techniques to take control of iOS and Android devices.
The first jailbreak for Apple's iOS7 has emerged, posing a security risk for businesses that operate a 'bring your own device' (BYOD) policy.
Massive Android botnet discovered, as APWG chairman warns on dangers of jailbroken iPhones.