Skip to main content

Private Internet Access VPN review

Using Private Internet Access VPN is a sure-shot way to curb eavesdroppers, avoid geo-discrimination, and generally surf the web with peace of mind.

David Balaban
David Balaban

Injecting Malware into iOS Devices via Malicious Chargers 5 - Problems and Fixes

The final part of the presentation covers the problems that may prevent the Mactans attack from getting through and the applicable workarounds for those.

John Dee
John Dee

Injecting Malware into iOS Devices via Malicious Chargers 4 - Pulling off the Mactans Attack

Yeongjin Jang and Billy Lau now provide a demo of how the actual Mactans charger can be used to pull off an attack on an iOS device.

John Dee
John Dee

Injecting Malware into iOS Devices via Malicious Chargers 3 - Installing an Arbitrary Hidden App

Yeongjin Jang provides further insight into the Mactans attack by describing provisioning profile obtaining process and installing a hidden app onto iOS device.

John Dee
John Dee

Injecting Malware into iOS Devices via Malicious Chargers 2 - Overview of the Mactans Attack

Billy Lau and Yeongjin Jang continue their Black Hat talk with describing the Mactans attack proper, including the charger’s properties and the attack phases.

John Dee
John Dee

Mactans - Injecting Malware into iOS Devices via Malicious Chargers

At Black Hat 2013, scientists from Georgia Institute of Technology dissect iOS security model and present Mactans, a proof-of-concept iOS attack via chargers.

John Dee
John Dee

iOS 6 Kernel Security 4 - Attack Strategies

Mark Dowd and Tarjei Mandt overview the more sophisticated iOS 6 attacks strategies where native protections may fail.

John Dee
John Dee

iOS 6 Kernel Security 3 - Kernel Address Space Protection

Moving along with the presentation, Mark Dowd and Tarjei Mandt overview kernel address space protection as a technique for preventing iOS 6 vulnerabilities.

John Dee
John Dee

iOS 6 Kernel Security 2 - Data Leaking Mitigations and Kernel ASLR

Experts from Azimuth Security now shed light on the goals and strategies of information leaking mitigations for iOS 6, and delve into the kernel ASLR technique.

John Dee
John Dee

iOS 6 Kernel Security - A Hacker's Guide

Azimuth Security’s Mark Dowd and Tarjei Mandt presenting an overview of the defensive and offensive strategies for iOS 6 platform at Hack in the Box event.

John Dee
John Dee