Tag: ios

  • VB2019 paper: Play fuzzing machine – hunting iOS and macOS kernel vulnerabilities automatically and smartly

    Apple ’s MacOS and iOS operating systems are often praised for their security. Yet vulnerabilities in both operating systems are regularly being found and exploited, especially by more advanced attackers. In a paper presented at VB2019 in London, Trend Micro researchers Lilang Wu and Moony Li explained how researchers like them hunt for such vulnerabilities…

  • VB2019 presentation: A deep dive into iPhone exploit chains

    One of the biggest security stories of 2019 was the use of advanced iOS and Android exploit chains against China’s Uighur minority, first uncovered by Google ’s Project Zero with more details supplied by Volexity . In a last-minute presentation at VB2019 in London, John Bambenek of the University of Illinois at Urbana-Champaign discussed details…

  • Vulnerabilities play only a tiny role in the security risks that come with mobile phones

    Last week saw yet another successful edition of Mobile Pwn2Own , the contest in which participants are challenged to attack fully patched mobile devices using previously unknown vulnerabilities. Contests like these, and their desktop equivalents, serve two purposes: device manufacturers have vulnerabilities responsibly disclosed to them, while offensive security researchers are able to show off…

  • Vulnerabilities play only a tiny role in the security risks that come with mobile phones

    Last week saw yet another successful edition of Mobile Pwn2Own , the contest in which participants are challenged to attack fully patched mobile devices using previously unknown vulnerabilities. Contests like these, and their desktop equivalents, serve two purposes: device manufacturers have vulnerabilities responsibly disclosed to them, while offensive security researchers are able to show off…

  • Throwback Thursday: Ten memorable Virus Bulletin conference presentations – part 2

    With an excellent conference programme featuring some of the top experts in the IT security industry and covering some of the most important topics, we have much to look forward to when it comes to VB2017 , the 27th Virus Bulletin conference. But we also often look back at past conference presentations, not just because…

  • Throwback Thursday: Ten memorable Virus Bulletin conference presentations – part 2

    With an excellent conference programme featuring some of the top experts in the IT security industry and covering some of the most important topics, we have much to look forward to when it comes to VB2017 , the 27th Virus Bulletin conference. But we also often look back at past conference presentations, not just because…

  • VB2014 paper: Apple without a shell – iOS under targeted attack

    Developer Enterprise Program recently found to be used by WireLurker. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Apple without a shell – iOS under targeted attack’, by FireEye researchers Tao Wei, Min Zheng, Hui Xue and Dawn Song.…

  • VB2014 preview: Apple without a shell – iOS under targeted attack

    FireEye researchers show a large attack vector for Apple’s mobile operating system. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some of the research that will be presented at the event. Today, we look at the paper ‘ Apple without a shell – iOS under targeted…

  • Paper: Inside the iOS/AdThief malware

    75,000 jailbroken iOS devices infected with malware that steals ad revenues. Believing that the device or operating system you use reduces your chance of being affected by malware is generally a bad idea, but those using iOS have the numbers on their side: malware targeting Apple ‘s mobile platform is very rare. But very rare…

  • Android SMS trojan goes wild

    Premium-rate text scam shows growing cracks in smart phone security. The first known SMS trojan affecting smart phones running Google ‘s Android operating system has been observed in the wild, highlighting growing cracks in the security veneer of the latest range of glossy smart phones. The trojan was first identified by researchers at Kaspersky Lab…