iBackDoor: High-Risk Code Hits iOS Apps
Introduction
FireEye mobile researchers recently discovered potentially
“backdoored” versions of an ad library embedded in thousands of iOS
apps originally published in the Apple App Store. The affected
versions of this library embedded funct…
iBackDoor: High-Risk Code Hits iOS Apps
Introduction
FireEye mobile researchers recently discovered potentially
“backdoored” versions of an ad library embedded in thousands of iOS
apps originally published in the Apple App Store. The affected
versions of this library embedded funct…
XcodeGhost S: A New Breed Hits the US
Just over a month ago, iOS users were warned of the threat to their
devices by the XcodeGhost malware. Apple quickly reacted, taking down
infected apps from the App Store and releasing new security features
to stop malicious activities. Through c…
XcodeGhost S: A New Breed Hits the US
Just over a month ago, iOS users were warned of the threat to their
devices by the XcodeGhost malware. Apple quickly reacted, taking down
infected apps from the App Store and releasing new security features
to stop malicious activities. Through c…
iBackDoor: High-risk Code Sneaks into the App Store
The library embeds backdoors in unsuspecting apps that make use of it
to display ads, exposing sensitive data and functionality. The
backdoors can be controlled remotely by loading JavaScript code from
remote servers to perform the following acti…
iBackDoor: High-risk Code Sneaks into the App Store
The library embeds backdoors in unsuspecting apps that make use of it
to display ads, exposing sensitive data and functionality. The
backdoors can be controlled remotely by loading JavaScript code from
remote servers to perform the following acti…
2015 FLARE-ON Challenge Solutions
The first few challenges narrowed the playing field drastically, with
most serious contestants holding firm through challenges 4-9. The last
two increased the difficulty level and proved a difficult final series
of challenges for a well-earned fi…
2015 FLARE-ON Challenge Solutions
The first few challenges narrowed the playing field drastically, with
most serious contestants holding firm through challenges 4-9. The last
two increased the difficulty level and proved a difficult final series
of challenges for a well-earned fi…
Windows Management Instrumentation (WMI) Offense, Defense, and Forensics
Windows Management Instrumentation (WMI) is a remote management
framework that enables the collection of host information, execution
of code, and provides an eventing system that can respond to operating
system events in real time. FireEye has re…