Kay C Lan wrote:
Steve may not realise it, but he might have just woken the sleeping
giant - the hoards of twisted individuals who gain pleasure from
writing malicious code.

The iPhone has already been the target of at least two, maybe three exploits.

All computing devices are subject to such exposures.

In fact, you don't even need a smart phone to terrorize people through phone hacks - older phones work just fine:

Cell Phone Stalkers Harass Washington Family
<http://abcnews.go.com/TheLaw/story?id=3312813&page=1>


All phones are inherently less secure than most computers, since with a computer you can disconnect it from the network.

The only way to get equivalent security with a phone is to turn it off.

--
 Richard Gaskin
 Fourth World
 Rev training and consulting: http://www.fourthworld.com
 Webzine for Rev developers: http://www.revjournal.com
 revJournal blog: http://revjournal.com/blog.irv
_______________________________________________
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution

Reply via email to