Apple has announced a security vulnerability that affects recent versions of operating systems for the iPhone, iPad, and iPod, as well as Mac OSX-based systems. This vulnerability, known as a “man in the middle” attack, allows an attacker to intercept, read, and change secure content you send and receive. For example, connecting to your banking information which […]
What is Phishing? Phishing (pronounced fishing) is a technique used by unsavory individuals and companies to try and fool you into giving out important personal and financial information. Armed with publicly available information plus what you supply, they can forge documents, set up accounts, and steal your identity. The ultimate purpose is to separate you […]