Reviews

A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 3 - Benefits of the Host Privilege

A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 3 - Benefits of the Host Privilege

Moving on with their presentation, the Team T5 experts delve into host privilege on Mac OS X in terms of the scope of permissions that a normal user can get.

A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 2 - Detecting a Process Hidden by Rubilyn

A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 2 - Detecting a Process Hidden by Rubilyn

Expert from Taiwan by the handle TT continues the presentation by elaborating on the cat and mouse game of hiding and detecting a random process on Mac OS X.

You Can’t See Me: A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet

You Can’t See Me: A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet

Sung-ting Tsai and Ming-chieh Pan, researchers from Taiwan-based Team T5, take the floor at Black Hat Asia to demonstrate how tricky a Mac OS X rootkit can be.

Bitdefender Antivirus for Mac review

Bitdefender Antivirus for Mac review

From this detailed review of Bitdefender Antivirus for Mac, learn about its usability, features, protection efficiency, and product support.

Injecting Malware into iOS Devices via Malicious Chargers 5 - Problems and Fixes

Injecting Malware into iOS Devices via Malicious Chargers 5 - Problems and Fixes

The final part of the presentation covers the problems that may prevent the Mactans attack from getting through and the applicable workarounds for those.

Injecting Malware into iOS Devices via Malicious Chargers 4 - Pulling off the Mactans Attack

Injecting Malware into iOS Devices via Malicious Chargers 4 - Pulling off the Mactans Attack

Yeongjin Jang and Billy Lau now provide a demo of how the actual Mactans charger can be used to pull off an attack on an iOS device.