By J. D. BIERSDORFER
How to protect from a vulnerability by which Android devices could be compromised by malicious code. Also, figuring out the iOS step counter.
Published: August 19, 2015 at 08:00PM
from NYT Technology http://ift.tt/1LjCaGn
via IFTTT