You Can’t See Me: A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet
Sung-ting Tsai and Ming-chieh Pan, researchers from Taiwan-based Team T5, take the floor at Black Hat Asia to demonstrate how tricky a Mac OS X rootkit can be.
Bitdefender Antivirus for Mac review
From this detailed review of Bitdefender Antivirus for Mac, learn about its usability, features, protection efficiency, and product support.
Injecting Malware into iOS Devices via Malicious Chargers 5 - Problems and Fixes
The final part of the presentation covers the problems that may prevent the Mactans attack from getting through and the applicable workarounds for those.
Injecting Malware into iOS Devices via Malicious Chargers 4 - Pulling off the Mactans Attack
Yeongjin Jang and Billy Lau now provide a demo of how the actual Mactans charger can be used to pull off an attack on an iOS device.
Injecting Malware into iOS Devices via Malicious Chargers 3 - Installing an Arbitrary Hidden App
Yeongjin Jang provides further insight into the Mactans attack by describing provisioning profile obtaining process and installing a hidden app onto iOS device.
Injecting Malware into iOS Devices via Malicious Chargers 2 - Overview of the Mactans Attack
Billy Lau and Yeongjin Jang continue their Black Hat talk with describing the Mactans attack proper, including the charger’s properties and the attack phases.
Mactans - Injecting Malware into iOS Devices via Malicious Chargers
At Black Hat 2013, scientists from Georgia Institute of Technology dissect iOS security model and present Mactans, a proof-of-concept iOS attack via chargers.
iOS 6 Kernel Security 4 - Attack Strategies
Mark Dowd and Tarjei Mandt overview the more sophisticated iOS 6 attacks strategies where native protections may fail.
iOS 6 Kernel Security 3 - Kernel Address Space Protection
Moving along with the presentation, Mark Dowd and Tarjei Mandt overview kernel address space protection as a technique for preventing iOS 6 vulnerabilities.
iOS 6 Kernel Security 2 - Data Leaking Mitigations and Kernel ASLR
Experts from Azimuth Security now shed light on the goals and strategies of information leaking mitigations for iOS 6, and delve into the kernel ASLR technique.