FaceTime Vulnerability – Enterprise Concerns

There’s a nasty FaceTime vulnerability that allows anyone to turn an iPhone into a surveillance tool. Exploiting the vulnerability couldn’t be easier (its so easy a child can do it). Just FaceTime the victim, then while the phone is ringing swipe up and add your number as another party on the call. This activates the […]

Your cart
subtotal:
$0.00

This will be copy area - something to the effect of estimated ship time if applicable

CONFIDENTIAL

Rendition's advanced courses contain the latest in information security knowledge. Please contact us for more information.

This page has proprietary information in it, please contact us for more information.