Information Security Archives
Technology, tricks, bugs, and current events, in the world of Information Security
- Update on August Ping Storms
- Ping Storms at GreyNoise
- 1Password - Full Trip from Unlock to Encryption
- BSidesDE - A deep dive into 1Password Security
- 1Password - Wrapping up with a few quick topics
- 1Password - Local Vaults
- 1Password - Into the Vaults!
- 1Password - Unlocking Windows Clients
- 1Password - MUKing about on the Mac
- How 1Password Works - Getting under the hood
- Encrypting for Apple's Secure Enclave
- iPhone Secure Enclave Firmware Key Found
- BSidesROC - A (not so quick) Primer on iOS Encryption
- Put away the tin-foil: The Apple unlock case is complicated enough
- Mobile App Authentication using TouchID and Tidas
- ShmooCon - My Hash Is My Passport: Understanding Web and Mobile Authentication
- DLP Considered Harmful - A Rant about Reliable Certificate Pinning
- Thoughts on CyberUL and Infosec Research
- Salt as a Service: Interesting approach to hashing passwords
- Nails in the Crypt - White Paper
- Lenovo, CA Certs, and Trust
- ShmooCon - Knock Knock: A Survey of iOS Authentication Methods
- Bypassing the lockout delay on iOS devices
- What's the deal with keyless entry car thefts?
- MCX - a lousy substitute for proven technology
- iPhone SMS forwarding -- cool, but may be risky
- Rebutting FUD and privacy issues surrounding Yosemite Spotlight
- NoVA Hackers - iOS Cryptography Slides
- Even more posts about iOS encryption
- A (not so) quick primer on iOS encryption
- Beacons being deployed in NYC phone booths
- Stealing user events from foreground apps on Android
- BSLV 2014 - Breaking PRNGs
- Duo Security Bypasses PayPal 2FA for Mobile Apps
- Early look at iOS 8 configuration profile changes
- More Mobile Malware Melodrama
- iOS Malware - Still FUDish, not quite a Real Problem (yet)
- Apple ID Compromise and Device Lockout
- How much of your email goes through Google?
- Inadvertent OS X Mail Loading of Images in SPAM
- Referrer considered harmful: Leaking location of obscurely shared docs
- Sanitize your outputs: Apple ID Password Logfile Disclosure
- CVE-2014-1279 - Password Disclosure via Apple TV Touch Setup
- More Fun with Apple TV Hacking (and Manual RSA Signature Validation)
- Apple TV Hacking, Counterattacks, and Certificate Pinning
- iStupid: the indescreet SSID tool
- Hijacking accounts using unicode magic
- Apple's security strategy: make it invisible
- A chameleon for your streams
- iOS 7 and Mavericks: New feature roundup from a security perspective – Intrepidus Group - Insight
- iOS 7 and Mavericks: New feature roundup from a security perspective
- Android Security Overview
- Skout server leaked nearly-exact location information on users
- Auto-updating iOS apps
- Two-factor authentication for Twitter: One account at a time
- Google Hangouts and XMPP
- Recovering iPhone Restrictions Passcode
- Social Share Privacy
- How To Safely Store A Password
- Apple, Forensics, Law Enforcement, and FUD
- iSniff your Wi-Fi and GPS your House
- iSniff your WiFi - Archived Comments
- iOS Configuration Profile Ransomware
- Getting ready for ShmooCon
- Evading evasi0n: iOS 6 Jailbreak Prevention
- Tracking Down the UDID Source - Archived Comments
- Tracking Down the UDID Breach Source
- What the flagnog? The Apple / FBI UDID breach, simplified.
- Apple's iOS Security Overview
- Apple Using Unsalted Hashes Too?
- Quick Look at Apple Configurator
- MDM Hacks - Archived Comments
- iOS MDM: Preventing Disassociation DOS and Potemkin Devices
- Verifying a Detached S/MIME Signature in Python
- Changes to iOS 5.0 MDM - Archived Comments
- Changes to Apple MDM for iOS 5.x
- ShmooCon 2012 - Apple MDM Slides
- iOS MDM Command Reference
- Finding Which Root CAs You Actually Use
- BlackHat 2011 Preview - Archived Comments
- Strengths and Weaknesses in Apple's MDM System
- BlackHat 2011 - Apple MDM Paper
- BlackHat 2011 - Apple MDM Slides
- Inside Apple's MDM Black Box -- Black Hat USA 2011
- Great Googly Moogly! I'm speaking at Black Hat!
- Nails in the Crypt - Archvied Comments
- Analysis of iOS Location Data from Multiple Devices
- Is the iOS 4 location tracking privacy issue overblown?
- NoVAHackers - Nails in the Crypt slides
- Quantifying the Unknown: Measuring a Theoretical SecurID Attack
- The RSA/SecurID Compromise: What is my risk?
- RSA/SecurID Compromise - Archived Comments
- VeriFone vs Square - A Draw?
- Simple Bypass of Safari Restrictions on iOS
- Bypassing MDM Restrictions for Mobile Safari on iOS 4.2
- Nails in the Crypt
- Rainbow Tables for Unix DES Crypt(3) Hashes
- Crazy Security Con Weekend!
- Half-Baked Idea: Isolate Browser Security Contexts to Limit XSS Attacks