jul 272015

“Pesquisa identifica vulnerabilidades no framework do sistema operacional, permitindo comprometer dispositivos de forma simples e remota”.

Leia a matéria.

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>



This site uses Akismet to reduce spam. Learn how your comment data is processed.