Kay C Lan wrote:
Steve may not realise it, but he might have just woken the sleeping
giant - the hoards of twisted individuals who gain pleasure from
writing malicious code.
The iPhone has already been the target of at least two, maybe three
exploits.
All computing devices are subject to such exposures.
In fact, you don't even need a smart phone to terrorize people through
phone hacks - older phones work just fine:
Cell Phone Stalkers Harass Washington Family
<http://abcnews.go.com/TheLaw/story?id=3312813&page=1>
All phones are inherently less secure than most computers, since with a
computer you can disconnect it from the network.
The only way to get equivalent security with a phone is to turn it off.
--
Richard Gaskin
Fourth World
Rev training and consulting: http://www.fourthworld.com
Webzine for Rev developers: http://www.revjournal.com
revJournal blog: http://revjournal.com/blog.irv
_______________________________________________
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription
preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution