Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Hacking and securing the iPhone, iPad and iPod Touch 4: iOS malware and vulnerabilities

Read previous: Hacking and securing the iPhone, iPad and iPod Touch 3: jailbreaking tools This part of Diana Kelley’s presentation is introductory to iOS security, analyzing safety of jailbreaking tools and describing known samples of iOS malware and vulnerabilities. Once you’ve jailbroken your phone,...

Hacking and securing the iPhone, iPad and iPod Touch 3: jailbreaking tools

Read previous: Hacking and securing the iPhone, iPad and iPod Touch 2: iOS jailbreaking Diana Kelley shows how to jailbreak using the LimeRa1n and RedSn0w solutions, talks on peculiarities of the Cydia and clarifies some other relevant technical aspects related to iOS jailbreak. These are kind of big, well...

Hacking and securing the iPhone, iPad and iPod Touch 2: iOS jailbreaking

Read previous: Hacking and securing the iPhone, iPad and iPod Touch: iOS features In this part of the talk, Diana Kelley explains whether it’s legal to jailbreak the iOS and clarifies the difference between tethered and untethered jailbreak. So what is jailbreaking? Jailbreaking is essentially breaking...

Hacking and securing the iPhone, iPad and iPod Touch: iOS features

Diana Kelley (Partner, SecurityCurve) gives a presentation at InfoSec World Conference to outline the background of the iOS and speak on security of iOS devices Hello and welcome! I’ll talk a little bit about hacking and securing the iPhone, and iPad, and the iPod Touch. Does anybody know why we can say...

Faces of Facebook 6: the future of face recognition

Read previous: Faces of Facebook 5: real-time personal identification using a smartphone Winding up the presentation, Alessandro Acquisti lists the current face recognition restrictions, concerns, and depicts the probable future of augmented reality. Availability of images I do believe that visual facial...

Faces of Facebook 5: real-time personal identification using a smartphone

Read previous: Faces of Facebook 4: offline-to-online re-identification experiment This part of the presentation outlines the ways to infer personal and sensitive information from a face image in real time, using smartphone applications. Experiment three was obviously asynchronous, in a sense that first we...

Faces of Facebook 4: offline-to-online re-identification experiment

Read previous: Faces of Facebook 3: “Dating site-to-Facebook” re-identification experiment Alessandro Acquisti now describes an offline-to-online re-identification experiment where someone’s anonymous photo helps find the Facebook profile, predict the SSN and figure out the subject’s...

Faces of Facebook 3: “Dating site-to-Facebook” re-identification experiment

Read previous: Faces of Facebook 2: facial taxonomy and statistical re-identification Alessandro Acquisti’s Black Hat USA report on face recognition continues with the detailed description of an online-to-online re-identification experiment conducted with the use of PittPatt application, based on analyzing...

Faces of Facebook 2: facial taxonomy and statistical re-identification

Read previous: Faces of Facebook: face recognition technologies In this part of the presentation, Alessandro Acquisti explains facial taxonomy components, analyzes DB types in statistical re-identification, and introduces the experiments that were held in this domain. The facial taxonomy here I am...

Faces of Facebook: face recognition technologies

Professor Alessandro Acquisti from Carnegie Mellon University takes the floor at Black Hat USA to speak on the role of Facebook and social media in face recognition research and advancement. Thanks everybody for being here, it’s always a great pleasure to be at Black Hat, and in this case I would like to...