Given the rich target environment presented by Apple users, this type of phishing attack makes sense. The iPhone is to smartphone users as the Windows OS is to PC’s. Many users click on SMS links out of blind faith in the obscurity of their phone’s OS, so this attack vector is particularly effective.
Sadly, many organizations find themselves in the majority of those surveyed in this article. Resources are simply not dedicated to monitoring systems and detecting anomalous behavior. If logs are being collected and correlated, the exceptions are not reviewed. Web application firewalls are either not in place or are not monitored appropriately. It is still a very slow process for the progression of proper security in most organizations.
I would like to pretend to be surprised, but emergency patching seems to be the norm with Adobe platforms. Please review and patch accordingly.
This is a curious article, especially given its conclusion. I do not believe that the FBI has been restricted in any significant way by this ruling. I simply believe the warrant process has been better clarified. There is and will continue to be a mechanism for this type of data collection by law enforcement in the US.
This is both troubling and completely expected. Cyber criminals have been leveraging the compassion of individuals since the beginning of the Internet. There are many worthy and safe mechanisms to use to give to those in need around the world. Take the time to do your research and give safely. Consider http://www.redcross.org/mo2 as a good starting point.