Join us FREE, we're FREE to use
Web's largest swingers site since 2006.
Already registered?
Login here
![]() | Back to forum list |
![]() | Back to The Lounge |
Jump to newest | ![]() |
Reply privately | Reply in forum | Reply +quote |
| |||
Reply privately | Reply in forum | Reply +quote |
"I have the Lloyd's tsb app on my phone, must be secure or they wouldn't be able to develop it x" didnt know about that, im with lloyds so will have alook | |||
Reply privately | Reply in forum | Reply +quote |
![]() | |||
Reply privately | Reply in forum | Reply +quote |
| |||
Reply privately | Reply in forum | Reply +quote |
![]() | |||
Reply privately | Reply in forum | Reply +quote |
"On bbc news website on about apple codes being hacked off FBI laptop so would have thought these would get someone into your phone ![]() not worried about people "getting into my phone" there isnt anything exiting to copy, but more worried about passwords etc over wifi or 3g | |||
Reply privately | Reply in forum | Reply +quote |
![]() ![]() ![]() | |||
Reply privately | Reply in forum | Reply +quote |
Reply privately | Reply in forum | Reply +quote |
| |||
Reply privately | Reply in forum | Reply +quote |
| |||
Reply privately | Reply in forum | Reply +quote |
"Most viruses, Trojans, worms etc are aimed at Microsoft and Microsoft by products. It's all down to the operating system that the phone uses. I think it's reasonable to accept that anything by apple is fairly secure as they don't use the same operating systems. So if you're using an iPhone then you're fairly secure. Can't speak for other smart phones, but as they say, "if you haven't got an iPhone, you haven't got an iPhone!" Lol ![]() ![]() ![]() I though they said "if you haven't got an iPhone, you're probably not a self-absorbed, boring dickhead" Sent from my iPad ![]() | |||
Reply privately | Reply in forum | Reply +quote |
"On bbc news website on about apple codes being hacked off FBI laptop so would have thought these would get someone into your phone ![]() Those were just the unique identifiers - similar to the imei code, not a way to access the phones. | |||
Reply privately | Reply in forum | Reply +quote |
"Most viruses, Trojans, worms etc are aimed at Microsoft and Microsoft by products. It's all down to the operating system that the phone uses. I think it's reasonable to accept that anything by apple is fairly secure as they don't use the same operating systems. So if you're using an iPhone then you're fairly secure. Can't speak for other smart phones, but as they say, "if you haven't got an iPhone, you haven't got an iPhone!" Lol ![]() ![]() ![]() Just about every smartphone in the world is running linux, underneath different GUI's. Even (ESPECIALLY) the precious iPhone :P | |||
Reply privately | Reply in forum | Reply +quote |
| |||
Reply privately | Reply in forum | Reply +quote |
"Most viruses, Trojans, worms etc are aimed at Microsoft and Microsoft by products. It's all down to the operating system that the phone uses. I think it's reasonable to accept that anything by apple is fairly secure as they don't use the same operating systems. So if you're using an iPhone then you're fairly secure. Can't speak for other smart phones, but as they say, "if you haven't got an iPhone, you haven't got an iPhone!" Lol ![]() ![]() ![]() ![]() for when an iphone doesnt make you look a bigenough idiot ![]() ![]() | |||
Reply privately | Reply in forum | Reply +quote |
"Is Linux prone to virus attack?" Nope, only geeks understand it ! | |||
Reply privately | Reply in forum | Reply +quote |
"Most viruses, Trojans, worms etc are aimed at Microsoft and Microsoft by products. It's all down to the operating system that the phone uses. I think it's reasonable to accept that anything by apple is fairly secure as they don't use the same operating systems. So if you're using an iPhone then you're fairly secure. Can't speak for other smart phones, but as they say, "if you haven't got an iPhone, you haven't got an iPhone!" Lol ![]() ![]() ![]() ![]() ![]() ![]() I own a number of Apple products but oddly, I've never paid for one ! :D | |||
Reply privately | Reply in forum | Reply +quote |
| |||
Reply privately | Reply in forum | Reply +quote |
" I though they said "if you haven't got an iPhone, you're probably not a self-absorbed, boring dickhead" Sent from my iPad ![]() ![]() ![]() Oi... I was saving the nerdy "how soon will you get the Iphone 5" thread for next week... I am thinking of camping out..... ![]() ![]() ![]() | |||
Reply privately | Reply in forum | Reply +quote |
" I though they said "if you haven't got an iPhone, you're probably not a self-absorbed, boring dickhead" Sent from my iPad ![]() ![]() ![]() ![]() ![]() ![]() Fill yer boots ![]() | |||
Reply privately | Reply in forum | Reply +quote |
![]() | |||
Reply privately | Reply in forum | Reply +quote |
"Mobile phones are generally fairly secure because of the layers they have between browser and storage, unlike most pcs or Macs. However none are totally secure because they're used by people, something you can't legislate for. If you're on android you're most susceptible because it's a fairly open platform and the most popular, therefore the naughty people concentrate more here because of the numbers and lower barriers to entry. iPhone and windows phone 7 have far more closed platforms. Wp7 doesn't allow flash at all which helps and also stops IE from having any access to user storage. IPhone is a little more open but it's still a case that its unlikely you'll install any sort of virus or Trojan unless you go for the more obscure apps and games on the appstore. So if on android, tool up with anti virus if it's available and keep away from dodgy looking apps. On the other platforms just use some common sense. Now ain't I fun at a party ![]() Purely in terms of malware: That said, you can still get a remote shell on an iPhone - even worse news if the user has a jailbreak: instant root privs. Not sure about windows phone, but it ain't all a matter of downloading a dodgy app... All you need is a buffer overflow (client-side web server with a java exploit is popular - user hits a webpage, simple as that) to run arbitrary code, then the device is owned - game over. | |||
Reply privately | Reply in forum | Reply +quote |
Post new Message to Thread |
back to top | ![]() |