Blog Posts Tagged with "Jailbreaking"

7c5c876d1933023ac375eead04302e1a

Un-Ninja the NinjaTel Phone

August 01, 2012 Added by:Boris Sverdlik

For the lucky few that did get the phone, you will be happy to know that the phone has been rooted, but the bootloader is locked. In order to get to any of the settings all that was required was pulling up the IDE app in an area where the phone couldn't connect to any of the pre-installed wireless access points...

Comments  (5)

37d5f81e2277051bc17116221040d51c

How Does Jailbreaking or Rooting Affect Mobile Device Security?

August 01, 2012 Added by:Robert Siciliano

By hacking your device, you can potentially open security holes that may have not been readily apparent, or undermine the device’s built-in security measures. Jailbroken and rooted phones are much more susceptible to viruses and malware...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Hacking Strikes Fear in the Heart of Texas Bureau of Prisons

June 24, 2012 Added by:Electronic Frontier Foundation

Whether you call them hackers, makers, tinkerers, or information security researchers, people on the hacking spectrum have been a boon to society for decades. They power innovation in all sectors and operate as a valuable check on the security and stability of the technology that forms the basis for our society...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Apple's Crystal Prison and the Future of Open Platforms

June 06, 2012 Added by:Electronic Frontier Foundation

Apps that require administrative privileges are impossible to install on an iOS device without jailbreaking it. This includes apps that let you firewall your device and secure your internet traffic with OpenVPN. Jailbreaking also helps security and privacy researchers to see if apps are leaking data...

Comments  (3)

37d5f81e2277051bc17116221040d51c

Your New Best Friend May Not Protect You

May 05, 2012 Added by:Robert Siciliano

Your mobile phone may be your new best friend. Four out of seven people have mobile phones, because a phone really is a great companion that brings us into contact with people, media, music, and finances. But unlike a German Shepherd, your mobile isn’t a security device...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Top 5 Things Learned at the SANS Mobile Device Security Summit

March 19, 2012 Added by:Tom Eston

Having a lineup of great speakers really made the summit flow as well as it did. What I liked most about this event was that there were plenty of “real world” talks on how enterprises are setting up and managing mobile deployments…real “in the trenches” types of talks...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Why Manufacturers Should Support Jailbreaking

December 27, 2011 Added by:Electronic Frontier Foundation

When security flaw was discovered when iPhone’s web browser opened PDF files, Apple was slow to patch it. Users who didn’t want to wait for the fix had a better way to protect themselves: jailbreak their phones to install an “unauthorized” patch created by an independent developer...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Digital Content Distribution Vulnerabilities

December 19, 2011 Added by:Danny Lieberman

An attack could be mounted on the STB/NPVR network to steal master keys and decrypt encrypted content. The cost of mounting the attack is far greater than the alternative of buying HD DVD media on the open market and producing pirated copies or ripping and putting it on a Torrent...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Five Security Considerations for a Mobile Phone

August 18, 2011 Added by:Robert Siciliano

Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommends the following tips to help you protect yourself and to help keep the web a safer place for everyone...

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

There's an App for That

March 15, 2011 Added by:Ron Baklarz

The App Genome Project was created as an ongoing effort to provide insight into mobile market dynamics, gain insight into how mobile apps access personal data and sensitive capabilities on mobile devices, and identify security threats in the wild...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Your iPhone May Be Phoning Home to the Apple HQ

December 30, 2010 Added by:Theresa Payton

Apple has filed a patent so your phone can phone home in the event that it is lost or it's human owner is lost. They feel this next step in technology is necessary for locating stolen phones. In the patent they mention they want to help customers better protect their sensitive information...

Comments  (0)

520b811ebc3d9ab82bb52132109ceb7e

iPhone & Android Jailbreaking

November 14, 2010 Added by:Marnix van Meer

The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...

Comments  (0)