Spoofing an Apple device and tricking users into sharing sensitive data

White hat hackers at the recent hacking conference Def Con demonstrated how to spoof an Apple device and trick users into sharing their sensitive data. At the recent Def Con hacking conference, white hat hackers demonstrated how to spoof an Apple device and trick users into sharing their sensitive data. As reported by Techcrunch, attendees […]

The post Spoofing an Apple device and tricking users into sharing sensitive data appeared first on Security Affairs.

This article has been indexed from Security Affairs

Read the original article: