iMessage is a widely used secure messaging app and protocol across the Apple ecosystem. Curious about what it would be like to run iMessage on other platforms, we reverse engineered to show how iMessage uses Apple Push Notification (APN) protocol to send and receive messages in conjunction with the system daemon apsd and demonstrate how Apple takes advantage of the fact that it produces the hardware to protect its software.
The Dirty COW vulnerability impacts many mobile devices. I analyzed it and its exploit and ended up writing a plug-in for Radare2.
Forty-five percent of chief information officers (CIOs), technology executives, and IT employees view mobile devices as a weak spot in their cybersecurity defenses. This according to “Your Biggest Cybersecurity Weakness Is Your Phone,” a piece published last week in Harvard Business Review. The essay lays out some best practices for securing mobile devices within the
The convenience of Instant Apps is appealing, but attackers will view it as a shiny new attack vector, and for me the security jury is still out.
Enterprises need to make mobile security technology part of their strategy to defend against mobile threats and secure apps that leak personal and corporate data.
To give you a clear view of the privacy and security status of the data on your mobile device, we built the free NowSecure Protect mobile security app.