COMPUTER COURSE ONLINE
FREE DOWNLOAD [PDF] from seriot.chN Seriot – Black Hat DC, 2010
This paper explains what data are at risk and how to get them pro- grammatically without the
user’s knowledge. These data include the phone number, email accounts settings (except
passwords), keyboard cache entries, Safari searches and the most recent GPS location.