Security research group Cryptopath has discovered a vulnerability in the way the iPhone OS handles authentication certificates that could enable potential attackers to gain access to user data. To take advantage of this flaw, an attacker would have to trick users into downloading a malicious file under the guise of a legitimate update. While there are no reports of this security flaw currently being exploited in the wild, be extra careful when opening unverified links or files until an official security update is released. follow link
Find Next Without Using the Find Dialog in Word 2008
Rarely do you want to find just one instance of a word or phrase in Word. Instead of trying to keep Word 2008's Find and Replace dialog showing while searching, which can be awkward on a small screen, try the Next Find control. After you've found the term you're looking for once, click the downward-pointing double arrow button at the bottom of the vertical scroll bar to find the next instance of your search term. The upward-pointing double arrow finds the previous instance, which is way easier than switching to Current Document Up in the expanded Find and Replace dialog.
- ExtraBITS for 8 February 2010 (08 Feb 10)
Stay Alert for iPhone Phishing Attacks