iOS 6 Kernel Security 2 - Data Leaking Mitigations and Kernel ASLR
In this part of their Hack in the Box presentation, Azimuth Security’s representatives provide an insight into the goals and tactics for iOS 6 data leaking mitigations, illustrating those with API code samples. Also, objectives and goals of the kernel ASLR strategy, namely randomizing kernel image base and kernel map, are being reviewed here.
iOS 6 Kernel Security - A Hacker's Guide
Mark Dowd and Tarjei Mandt from Azimuth Security take the floor at the Hack in the Box conference to provide an all-around overview of iOS 6 security improvements, kernel-based mitigations for the platform, and jailbreak-related issues. The presentation covers iOS 6 kernel security details from both the defensive and offensive perspective.
Combatting Mac OS X / iOS Malware with Data Visualization 2
As Remy Baumgarten proceeds with his presentation of Mach-O Viz, a solution for Mac OS X and iOS malware analysis, he dwells on the tool’s entire feature set broken into a variety of options for generating and viewing visualized data about a file of interest. Also, the expert provides a demo of how the application handles the samples of code for some known Mac malware.
Combatting Mac OS X / iOS Malware with Data Visualization
Remy Baumgarten from ANRC Services took the floor at Defcon 21 Conference to tell the audience about a new tool called Mach-O Viz which was designed for Mac malware analysis. In particular, the expert focuses on specific capabilities built into the software, its GUI structure, and visualization benefits it provides.
Top 10 iOS 7 Hidden Features
This article is intended to shed light upon the useful features of the new iOS 7 platform which many Apple users may not yet know about although they are there. We have singled out the top 10 hidden features that significantly facilitate managing your device and make it a yet handier thing in terms of everyday use. So get ready to learn about the iOS 7 capabilities you will definitely love after reading this review of ours.
OS X Anti-Forensics Techniques 3 - Expanding the Attack Space
Providing a yet deeper insight into methods for avoiding forensics while using Mac OS X, the Grugq enumerates several more attack vectors, including those associated with zero width Unicode, application file formats, browser cookies and SQLite. In conclusion, the researcher highlights some essential anti-forensics recommendations overall, and answers a few questions from the HIRBSecConf attendees on the topic.