Law enforcement's ability to depends on "exploits," hacker tricks that take advantage of vulnerabilities in the phones' operating systems. Many exploits are kept quiet, to be sold to criminals or security companies. Others leak out. Here's a list of some of the known cracks in the security of the two major types of smartphone.
Brute force attack: : The most direct way past a password is to throw a lot of guesses at it. If you're using Apple's basic four-digit PIN, it'll take no more than 10,000 guesses. That's a lot of guesses to enter by thumb; it's child's play for a computer. Apple for brute force attacks on its newest operating system, iOS 7, though hackers are most likely probing it for new vulnerabilities.
Special Interest Glance
An Iraq War veteran whose skull was fractured during an Occupy Oakland protest when he was hit by a beanbag round fired by police has reached a tentative $4.5 million agreement to settle a federal lawsuit with the city of Oakland, his lawyers and city officials announced Friday.
Microsoft is defending its right to break into customers' accounts and read their emails.
Ohio Secretary of State Jon Husted announced Tuesday he is cutting early voting on Sundays and weekday evenings, dealing another blow to the voting rights effort in the nation’s most pivotal swing state.





























