Apple products, such as the iPhone, iPad, and Macbook are NOT immune from successful attack and exploitation. Why? Because the weakest part of Apple security is the user behind the keyboard. That’s right, it’s YOU!. Email and website based attacks work the same for Apple users, Windows users, and even Linux users. Send a well-crafted phishing email, and wait for the target to ...
Continue Reading →SEP