Methods of malware persistence on OS X

Microsoft TechEd Europe 2014 Keynote

An Offensive View Of The Internet

Governments As Malware Authors: The Next Generation

Mikko Hyppönen, Blackhat USA ’14

iPhone Encryption and the Return of the Crypto Wars

“Last week, Apple announced that it is closing a serious security vulnerability in the iPhone. It used to be that the phone’s encryption only protected a small amount of the data, and Apple had the ability to bypass security on the rest of it.

From now on, all the phone’s data is protected. It can no longer be accessed by criminals, governments, or rogue employees. Access to it can no longer be demanded by totalitarian governments. A user’s iPhone data is now more secure.

To hear US law enforcement respond, you’d think Apple’s move heralded an unstoppable crime wave. See, the FBI had been using that vulnerability to get into people’s iPhones. In the words of cyberlaw professor Orin Kerr, “How is the public interest served by a policy that only thwarts lawful search warrants?”

‘iPhone Encryption and the Return of the Crypto Wars’ weiterlesen