iPad

iPhones, iPads ripe for the picking

By Tim Greene, Network World | August 25th, 2014 USENIX Security Symposium: Georgia Tech researchers show how PC botnets could infect iOS devices to steal passwords. Attackers could compromise iPads and iPhones on a large scale through the infected computers that make up botnets, researchers say. Nearly a quarter of zombie computers that make up …

iPhones, iPads ripe for the picking Read More »

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

By Jonathan Zdziarski, zdziarski.com | July 20th, 2014 The presentation contains: overview of a number of undocumented high-value forensic services running on every iOS device examples of forensic artifacts acquired that should never come off the device without user consent surveillance mechanisms to bypass personal security (intended for enterprises), but make potential targets suspicious design …

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices Read More »