Foster Institute
  • Home
  • Contact
800.657.7107 | 707.200.2095
  • What Keeps You Up at Night?
  • Services
  • Speaking & Training
  • Testimonials
  • About
  • Store
  • Blog

Home › Blog › Archive

Posts Tagged ‘infected apps’

 

iPhone and iPad Hacking Alert

You may have heard by now about XcodeGhost and how it is the biggest infection for Apple yet. Hackers inserted malicious code into a tool that programmers use to develop Apps for the App store. What should you do now? Continue reading ‘iPhone and iPad Hacking Alert’


Posted by Mike Foster in Adobe, Apple, Apple Virus, Infected Apps, IT Security, mobile devices, Security Breach, Technology Safety, Technology Safety Tips on September 28th, 2015.

Tags: Apple apps, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, cyber security expert, Cyber Security Tips, hackers, infected apps, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, PDF reader virus, risk management, tech support, Winzip virus, XcodeGhost

  • Watch Mike on YouTube
  • Follow @safenetwork
  • Join Mike on Facebook
  • Connect with Mike Foster
  • Subscribe to the Blog

Recent Blog Posts

  • New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City
  • A New Opportunity for Your IT Pros to Protect your Servers
  • How Buying a Spare Printer can Vastly Improve Your Cyber Security
  • When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush
  • Patching Nightmare – Please Forward to Your IT Pros
  • Three Serious Trends to Watch Out for in Cyber Security
  • Major Flaw in Computer Processors Affects Security
  • Protecting and Restricting iPads, iPhones, and Android Devices

Blog Topics

  • Account Lockout Policy
  • ACH Fraud
  • Acronis True Image
  • Adobe
  • Adobe Flash
  • AI
  • Airport Safety
  • Android
  • Anti-virus
  • Apple
  • Apple Virus
  • Application Updates
  • Application Whitelisting
  • Applying IT Patches
  • Backup
  • Best Practices
  • Big Screen iphone
  • Bitcoin
  • Bitlocker
  • Bromium
  • browser security
  • Carbon Copy Cloner
  • CCleaner
  • Children
  • Cloud
  • Computer Processor
  • Credit Bureaus
  • Credit Card Security
  • Credit Freeze
  • Customer Service
  • Cyber Attacks
  • Cyber Future
  • Cyber Scams
  • Cyber Security
  • Cyber Security Breach
  • Cyber Security Training
  • Data Loss Prevention
  • Data Restoration
  • DEF COM
  • Disaster Recovery
  • Download
  • Equifax
  • Executive Tips
  • Executives and IT
  • Facebook
  • Family Cyber Safety
  • Fire Phone
  • Firefox
  • Firing IT Firms
  • free wifi
  • FTC
  • Gmail
  • Google
  • Google Docs
  • GoToMyPC
  • Hacker Insight
  • Hackers
  • Hacking Competition
  • Heartbleed
  • High Sierra
  • Home Computers
  • hotspot
  • hotspot safety
  • Identity Theft
  • Infected Apps
  • International Security
  • Invisible Security Threats
  • iOS 11
  • IT Best Practices
  • IT Compliance
  • IT Discussions
  • IT Future
  • IT Network
  • IT Pay
  • IT Pro Tips
  • IT Professionals
  • IT Security
  • IT Settings
  • IT Training
  • IT Virus
  • IT Workshops
  • java
  • Kasperski
  • KRACK
  • laptops
  • LastPass
  • Learn to Program
  • Linux Patch
  • Mac Protection
  • Mac Virus
  • MacBook
  • Malware
  • Microsoft Patch
  • Microsoft Settings
  • Mimecast
  • MINIX
  • mobile devices
  • National Security Agency
  • NIST
  • NIST Recommendations
  • NSA
  • NYC Secure
  • Online Impersonators
  • Online Security
  • Operating Systems
  • Outsourced IT Firms
  • Outsourcing IT
  • password
  • Password Manager
  • Password Safety
  • Password Security
  • Patch Release
  • Patch Updates
  • Patches
  • Petya
  • phones
  • Preventative IT Mainenance
  • Preventative IT Security Breach
  • Programs
  • Project Management
  • Pwn2Own
  • Ransomware
  • Remote Workers
  • Restoring
  • Ring Potential Three
  • RSA
  • Save time
  • Scratch
  • Security Breach
  • Security Logs
  • Shadow Protect Desktop
  • Sir Michael Fallon
  • social media
  • Solid State Drives
  • Spam
  • Spam Phishing
  • SSD
  • Stolen Data
  • Student Cyber Security
  • SuperTech 2015
  • SuperTech 2016
  • surface pro
  • Targeted Threat Protection
  • TeamViewer
  • Technology
  • Technology Distractions
  • Technology Safety
  • Technology Safety Tips
  • Technology Security
  • Technology Tips
  • Threat Protection Software
  • touch screen
  • Troubleshooting
  • Turkish Crime Family
  • two set logon
  • two step login
  • UK
  • Uninstall
  • Upgrade
  • Videos
  • VirtusTotal.com
  • Virus
  • WDAG
  • Website Security
  • Whitelisting
  • wi-fi best practices
  • wi-fi safety
  • wi-fi security
  • Windows 10
  • Wire Transfer Fraud
  • Working with IT
  • Workplace Safety
  • Workplace Shooter
  • Yahoo

Bookmark Blog

  • RSS Feed
  • Reader
  • Technorati
  • Windows
  • My Yahoo!
  • Delicious


Services

  • IT Security Review and Audit
  • IT Best Practices Review
  • Website / Web Application
  • Physical Security
  • What to Do if a Gunman Enters Your Office
  • Cloud Security & Best Practices
  • Mobile Security & Best Practices
  • Assessment of Outsourced IT
  • Network Penetration Testing
  • IT Security Presentation for Inhouse and Remote Workers
  • PCI and Credit Card Security
  • SEO Consulting and Coaching

Resources

  • Store
  • Message for CEOs & Execs
  • Message for IT Professionals
  • Mike Foster's Blog
  • E-Savvy Newsletter
  • FAQs

About

  • What Keeps You Up at Night?
  • Services
  • Speaking and Training
  • Testimonials
  • Consultation
  • Contact Us

The Foster Institute • USA/Canada: 1-800-657-7107 • Direct: 707-200-2095 • P.O. Box 30, Napa, CA, 94559 USA

USAProudly Serving the Entire USA

© 2018 The Foster Institute Inc. All Rights Reserved. Legal Forms. Sitemap.

Web design & SEO by Prime Concepts Group, Inc.

  • YouTube
  • Twitter
  • Facebook
  • LinkedIn
  • Blog