Rooting

Results: 207



#Item
91Technology / Android / Information appliances / Embedded Linux / Data synchronization / Rooting / Personal digital assistant / Mobile application development / Mobile device management / Computing / Software / Smartphones

Making the Google Android™ Operating System “Enterprise-Ready” How Honeywell Scanning & Mobility Solves the Security Challenges Honeywell Scanning & Mobility Mika Majapuro, Manager - Product Marketing and Daniel Ye

Add to Reading List

Source URL: www.honeywellaidc.com

Language: English - Date: 2013-02-18 17:00:38
92X86 architecture / BIOS / Computer keyboards / Surveillance / Firmware / Universal Serial Bus / Rooting / USB flash drive / Apple Keyboard / Computer hardware / Computing / Apple Inc.

Reversing and Exploiting an Apple® Firmware Update

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:42
93Computer architecture / Android / IOS / Mach / Multi-touch / App Store / Rooting / Mobile application development / Software / Computing / Smartphones

Mobile Security 2013 Phenomenal Cosmic Power, Itty Bitty Living Space Software Confidence. Achieved.

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
94Technology / Cloud clients / Windows Mobile / Cloud applications / Web 2.0 / International Mobile Equipment Identity / Android / Rooting / IPhone / Smartphones / Computing / Centralized computing

Safer smartphones - a guide to keeping your device secure

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2014-08-25 09:19:10
95Android / Computing / Free software / Cloud clients / Malware / Motorola Droid / Rooting / Android software development / Smartphones / Software / Embedded Linux

Android Platform Realities  What makes the malware to rise high? ─ Android provenance system ● Application masquerading (repackaging) is easy ─ Permissions are user centric

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:03
96Input/output / Multi-touch / ITunes / Smartphones / IOS / Wi-Fi / IPad / Password / Rooting / Computing / Apple Inc. / IPhone

SANS MGT-438 Ten Security Tips Erik Couture 10 iPhone/iPad Security Tips 1. Use a Passcode Lock – The simplest and most effective way to reduce the risk to your

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:53
97Technology / Cloud clients / Windows Mobile / Cloud applications / Web 2.0 / International Mobile Equipment Identity / Android / Rooting / IPhone / Smartphones / Computing / Centralized computing

Safer smartphones - a guide to keeping your device secure

Add to Reading List

Source URL: www.phonepayplus.org.uk

Language: English - Date: 2014-01-28 10:17:02
98Apple Inc. / Rooting / Android / App Store / Mobile apps / IPhone / Android Market / Mobile business intelligence / Smartphones / Computing / Software

OUCH! | January[removed]IN THIS ISSUE... • Overview • Obtaining Mobile Apps • Permissions

Add to Reading List

Source URL: www.utsystem.edu

Language: English - Date: 2015-01-08 16:28:00
99Apple Inc. / Rooting / Android / App Store / Mobile apps / IPhone / Android Market / Mobile business intelligence / Smartphones / Computing / Software

OUCH! | January[removed]IN THIS ISSUE... • Overview • Obtaining Mobile Apps • Permissions

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-01-06 10:33:34
100Computing / Embedded Linux / Android Market / Mobile software / Mobile operating system / Mobipocket / Motorola Droid / Rooting / Android software development / Software / Smartphones / Android

Fraunhofer Research Institution for A p p l i e d a n d I n t e g r at e d S e c u r i t y Android OS Security: Risks and Limitations A Practical Evaluation

Add to Reading List

Source URL: www.aisec.fraunhofer.de

Language: English - Date: 2015-01-15 07:02:10
UPDATE