Deekin_Scalesinger writes: More than eighteen months after being first brought to Cupertino's attention, Apple gets around to addressing insecure logins to the App Store. In theory, this could be used to view lists of installed apps and make unauthorized purchases.
You can do this in a number of ways. IBM chose to do all of them.
Why do you find that funny?
-- D. Taylor, Computer Science 350