Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

A Forensic Analysis of Android Network Traffic 3: Data harvesting by Zynga and Words With Friends

Read previous: A Forensic Analysis of Android Network Traffic 2: Research methodology Eric Fulton’s focus here is on the types of information Zynga and Words With Friends apps are collecting about their users, based on packet capture files data. So let’s start analyzing. With each packet capture, I first...

A Forensic Analysis of Android Network Traffic 2: Research methodology

Read previous: A Forensic Analysis of Android Network Traffic This part of Eric Fulton’s presentation encompasses the methodology and tools applied for conducting the Android network traffic analysis. So Scientific Method to the rescue: what I wanted to do was create a kind of reproducible project that...

A Forensic Analysis of Android Network Traffic

Lake Missoula Group’s Director of Research Eric Fulton introduces his Defcon 19 talk about Android privacy risks and security vulnerabilities emanating from smartphone apps. Hi there! My name is Eric Fulton, I work for a consulting firm called Lake Missoula Group, in beautiful Missoula, Montana. I know...

Hacking and securing the iPhone, iPad and iPod Touch 6: iOS security precautions

Read previous: Hacking and securing the iPhone, iPad and iPod Touch 5: is the iOS enterprise-ready? Ending her InfoSec World presentation, Diana Kelley talks about securing the iOS, configurable safety restrictions, and draws final conclusions on the topic. If you’re gonna go ahead and jailbreak,...

Hacking and securing the iPhone, iPad and iPod Touch 5: is the iOS enterprise-ready?

Read previous: Hacking and securing the iPhone, iPad and iPod Touch 4: iOS malware and vulnerabilities Diana Kelley outlines the enterprise prospects of the iOS, advises on encryption, authentication, and third-party solutions to enhance security of the device. Okay, so the big question here is: can we bring...

Hacking and securing the iPhone, iPad and iPod Touch 4: iOS malware and vulnerabilities

Read previous: Hacking and securing the iPhone, iPad and iPod Touch 3: jailbreaking tools This part of Diana Kelley’s presentation is introductory to iOS security, analyzing safety of jailbreaking tools and describing known samples of iOS malware and vulnerabilities. Once you’ve jailbroken your phone,...

Hacking and securing the iPhone, iPad and iPod Touch 3: jailbreaking tools

Read previous: Hacking and securing the iPhone, iPad and iPod Touch 2: iOS jailbreaking Diana Kelley shows how to jailbreak using the LimeRa1n and RedSn0w solutions, talks on peculiarities of the Cydia and clarifies some other relevant technical aspects related to iOS jailbreak. These are kind of big, well...

Hacking and securing the iPhone, iPad and iPod Touch 2: iOS jailbreaking

Read previous: Hacking and securing the iPhone, iPad and iPod Touch: iOS features In this part of the talk, Diana Kelley explains whether it’s legal to jailbreak the iOS and clarifies the difference between tethered and untethered jailbreak. So what is jailbreaking? Jailbreaking is essentially breaking...

Hacking and securing the iPhone, iPad and iPod Touch: iOS features

Diana Kelley (Partner, SecurityCurve) gives a presentation at InfoSec World Conference to outline the background of the iOS and speak on security of iOS devices Hello and welcome! I’ll talk a little bit about hacking and securing the iPhone, and iPad, and the iPod Touch. Does anybody know why we can say...

Faces of Facebook 6: the future of face recognition

Read previous: Faces of Facebook 5: real-time personal identification using a smartphone Winding up the presentation, Alessandro Acquisti lists the current face recognition restrictions, concerns, and depicts the probable future of augmented reality. Availability of images I do believe that visual facial...