The security of Android devices has come under quite a lot of scrutiny in recent months, with researchers identifying various root exploits and permission leaks that could be exploited. In this video, researcher Thomas Cannon of ViaForensics demonstrates a method for setting up a remote shell on an Android device without using any exploits or vulnerabilities. The method works on various versions of Android, up to and including Gingerbread.
Browsing Category: Videos
Be careful of what you ask for. That’s a lesson that Max Schrems of Vienna, Austria, learned the hard way when he sent a formal request to Facebook citing European law and asking for a copy of every piece of personal information that the world’s largest social network had collected on him.
Spam has been a scourge on the Internet for more than 15 years now, and many plans and technologies have emerged to try and fight it. Some have worked well, others have failed miserably. In this video, MIchael Kaplan presents a proposal for authenticating every mail transfer agent on the Web as a way of identifying all spam messages.
Google announced its long-awaited mobile payments platform, Google
Wallet, in New York City on Thursday. The company claims it will
revolutionize commerce. But with stories about massive data breaches and
hacks an almost daily occurance, consumers are most concerned about
whether Google Wallet is secure. Here’s what you need to know.
In this video, the folks at Offensive Security demonstrated exactly how the Windows DLL-hijacking vulnerability can exploited using Metasploit and a benign PowerPoint slide.
In this video, Aza Raskin of Mozilla demonstrates a new class of phishing attack in which the attacker is able to use malicious code in one browser tab to completely change the content in another tab on a victim’s browser.
In this video, Lenny Zeltser, a SANS instructor, outlines the basic concepts of reverse engineering malware, describing the process of analyzing the code and the behavior of the malware.
Independent Security Evaluators’ Charlie Miller discusses Safari bugs, his predictions for this year’s PWN2OWN and mobile security with Ryan Naraine at RSA 2010.
This video demonstrates a proof-of-concept BlackBerry spyware package developed by Tyler Shields, one of Veracode’s senior security researchers.
[img_assist|nid=2755|title=|desc=|link=none|align=right|width=100|height=100]Microsoft has started dropping broad hints that an emergency patch for Internet Explorer will be released very soon to counter targeted attacks and the publication of exploit code for a “browse and you’re owned” vulnerability in its flagship Web browser.