Blog Posts Tagged with "Charlie Miller"
March 26, 2012 Added by:Pierluigi Paganini
Once the vulnerability and exploit are found, the researcher must be able to in a short time identify the possible customers, then contact them for negotiating the price and completing the sale. There are concrete risks...
November 09, 2011 Added by:Headlines
Miller "planted a sleeper app in Apple’s App Store to demonstrate the trick–an app can phone home to a remote computer that downloads new unapproved commands onto the device... including stealing the user’s photos, reading contacts... or otherwise repurposing normal iOS app functions..."
November 04, 2011 Added by:Headlines
Messmer's list is comprised of those "who year after year demonstrate the specialized skills that make them worth listening to". Several recently gave presentations at Hacker Halted and at Black Hat, and Infosec Island was fortunate enough to have conducted video interviews with them...
August 08, 2011 Added by:Rafal Los
This is real-life attacking. Attackers have time on their side, and know that it is human nature to over-protect the things we value, but to forget to protect those things that we feel are not-so-important... even though they are often connected to those super-critical things...
March 17, 2011 Added by:Headlines
A successful exploit could allow the attacker to use the BlackBerry Browser to access user data stored on the media card and in the built-in media storage on the BlackBerry smartphone, but not to access user data that the email, calendar and contact applications store in the application storage...
March 13, 2011 Added by:Anthony M. Freed
"Apple doesn't have a perceived security problem by customers and so they haven't had a need to invest heavily in it. I've done what I can to try to educate people that Apple products aren't magical and can have security problems like every other product..."
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013