iPhone

iPhones, iPads ripe for the picking

By Tim Greene, Network World | August 25th, 2014 USENIX Security Symposium: Georgia Tech researchers show how PC botnets could infect iOS devices to steal passwords. Attackers could compromise iPads and iPhones on a large scale through the infected computers that make up botnets, researchers say. Nearly a quarter of zombie computers that make up …

iPhones, iPads ripe for the picking Read More »

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

By Jonathan Zdziarski, zdziarski.com | July 20th, 2014 The presentation contains: overview of a number of undocumented high-value forensic services running on every iOS device examples of forensic artifacts acquired that should never come off the device without user consent surveillance mechanisms to bypass personal security (intended for enterprises), but make potential targets suspicious design …

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices Read More »

China calls the iPhone and iOS 7 threats to national security

By Gregg Keizer, Computerworld | July 11th, 2014 State-run media blasts ‘Frequent Location’ feature. China’s state-run television today told owners of Apple’s iPhone that the device is a threat to national security because it tracks their movements. Reuters reported on the broadcast by CCTV (China Central Television) earlier Friday. The segment broadcast by CCTV took …

China calls the iPhone and iOS 7 threats to national security Read More »