Security Magazine: We Are All Jeff Bezos

Published by Mike Fong on August 7, 2020

As much of the world continues to hunker down at home in response to COVID-19, threat actors continue to find ways of exploiting the crisis to gather sensitive and valuable information from individuals. But while we’re busy making sure that our primary computers and cloud-based accounts are locked down, it’s often the devices we least suspect – our smartphones – that provide the opening that hackers need. The 2018 hacking of Jeff Bezos’s iPhone X, perhaps the most famous example of smartphone hacking, provides an important reminder that these most personal of devices should be used with appropriate caution, especially in this time of upheaval.

Previous
Previous

SalesTech Star: SalesTech Star Interview with Michael Campbell, Head of Federal and Government Business at Privoro

Next
Next

Remote Work Is Here To Stay — Cybersecurity Needs To Catch Up