« New Whitepaper (BlackHat Barcelona 2011): Application Attacks Against Apple’s iOS | Main | Cross Device Attacks Using Cloud Sync: An iCloud Example »

December 05, 2011

Comments

The comments to this entry are closed.

My Books