Information Security of Apple Devices: Mac’s and IPhone’s

Contributed by Samuel Sanchez

Lately, in the past few years there has been a popular belief that the Mac OS X and the mobile IPhone are immune to viruses, worms, Trojans, etc. Apple, Inc. has repeatedly made advertisements stating that their devices are virus free and that anyone using a device other than an Apple product is vulnerable to hacking. This article will explain how this is now a proven myth and a few examples of known exploits used today.

This document is in PDF format. To view it click here.


Current Security Issues within the Android Operating System

Contributed by Leonard M. Pickering

Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of Google in 2005. After three years of development, the first Android based mobile phone was available for sale in November of 2008. As of today, the Android operating system has been installed on over 1.4 billion devices, and is currently the most widely used computer operating system in the world. Due to the constantly increasing number of Android specific malware and other exploits, it has also become the most targeted and most vulnerable.

This document is in PDF format. To view it click here.


Android and iOS Security

Contributed by Jeremiah Everett

This paper will discuss security for the Android OS and Apple's iOS. So for a little background we will look at when Android and iOS were first released. Android was released to the public on the HTC Dream in October of 2008, and Apple’s iOS came out in March of 2008. Since the time of release more and more malware has been created and need for better security has been realized. In the article Android Security: A Survey of Issues, Malware Penetration, and Defenses, they state that increased popularity of the Android device and associated monetary benefits attracted malware developers, and this resulted in a big rise of Android malware apps between 2010 and 2014.

This document is in PDF format. To view it click here.


Mobile Device Security

Contributed by Dietrich Lehr

I will be focusing on mobile device security as it pertains to methodologies used to secure critical components of smartphone use. I will analyze and compare the two smartphone platform leaders, Apple and Android and the way they secure their devices. I will also provide insight as to which methods may be stronger and better for users to implement chose if multiple options are available.

This document is in PDF format. To view it click here.


Fun things to do with a Honeypot

Contributed by Alberto Gonzalez and Jason Larsen

Honeypots are a hot topic in the security research community right now. Everyone is starting up their own honeypot system. While most of current literature available on them deals with the potential gains a honeypot can give you, and how to monitor them, not very many of them deal with the mechanics of honeypots themselves.

Most honeypots as deployed from spare parts. Many start as just an extra box someone has lying around. A security savvy technician has slapped an OS on it, checksummed all the files, installed an IDS, and set about waiting for the hackers to arrive. These haphazard kinds of honeypots ignore some of the most interesting capabilities of honeypots. Honeypots can be used to ensnare and beguile potential hackers, entice them to give you more research information, and actively defend a production network.


Subscribe to RSS - Sistema