IOS jailbreaking

Results: 173



#Item
41Q1 2014 Mobile Threat Report

Q1 2014 Mobile Threat Report

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-08-28 23:41:31
42The Effect of Developer-Specified Explanations for Permission Requests on Smartphone User Behavior Joshua Tan1 , Khanh Nguyen2 , Michael Theodorides3 , Heidi Negr´on-Arroyo4 , Christopher Thompson3 , Serge Egelman3 , Da

The Effect of Developer-Specified Explanations for Permission Requests on Smartphone User Behavior Joshua Tan1 , Khanh Nguyen2 , Michael Theodorides3 , Heidi Negr´on-Arroyo4 , Christopher Thompson3 , Serge Egelman3 , Da

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
43Media Release For Immediate Release Total: 5 pages I2R and SMU strengthen security of iOS platform with mitigating measures on proof-of-concept attacks

Media Release For Immediate Release Total: 5 pages I2R and SMU strengthen security of iOS platform with mitigating measures on proof-of-concept attacks

Add to Reading List

Source URL: www.i2r.a-star.edu.sg

Language: English - Date: 2013-10-02 02:36:21
44www.ebankingbutsecure.ch  «Mobile Banking» Information and Prevention Risks when mobile banking • Phishing attack: A fraudster captures your access data and thus

www.ebankingbutsecure.ch «Mobile Banking» Information and Prevention Risks when mobile banking • Phishing attack: A fraudster captures your access data and thus

Add to Reading List

Source URL: www.ebankingabersicher.ch

Language: English - Date: 2014-06-06 08:24:01
45Microsoft Word - 63178286_1.DOC

Microsoft Word - 63178286_1.DOC

Add to Reading List

Source URL: www.groklaw.net

Language: English - Date: 2011-03-02 20:48:34
46On the Feasibility of Large-Scale Infections of iOS Devices Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, and Wenke Lee, Georgia Institute of Technology https://www.usenix.org/conference/usenixsecurit

On the Feasibility of Large-Scale Infections of iOS Devices Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, and Wenke Lee, Georgia Institute of Technology https://www.usenix.org/conference/usenixsecurit

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-02-23 13:03:46
47The OWASP Foundation http://www.owasp.org Security Testing Guidelines for mobile Apps Florian Stahl

The OWASP Foundation http://www.owasp.org Security Testing Guidelines for mobile Apps Florian Stahl

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-02-24 04:13:33
48App Threat Report  Marble Labs Mobile Threat Report, February 2015 US Publishers Are Responsible for Most Malicious and Risky Apps, Putting Everyone with a Smartphone at Risk

App Threat Report Marble Labs Mobile Threat Report, February 2015 US Publishers Are Responsible for Most Malicious and Risky Apps, Putting Everyone with a Smartphone at Risk

Add to Reading List

Source URL: www.marblesecurity.com

Language: English - Date: 2015-02-02 19:54:18
49Securing iOS Applications  Dr. Bruce Sams, OPTIMAbit GmbH About Me

Securing iOS Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-16 17:34:42
50 iOS Direct Service Program Overview Apple will use the following criteria to determine whether your organization qualifies for authorization as an   iOS Direct Service (IDS) program participant. Providing this infor

 iOS Direct Service Program Overview Apple will use the following criteria to determine whether your organization qualifies for authorization as an   iOS Direct Service (IDS) program participant. Providing this infor

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2011-04-19 18:30:32