Главная
Study mode:
on
1
Introduction
2
Why Apple ID
3
Leakage
4
Phone Call
5
URL
6
Curator
7
Apple Store
8
Instagram and WhatsApp
9
Google
10
Password reuse
11
Email system
12
Brute Force
13
Prevent Brute Force
14
The Underground Economy
15
How to make porridge
16
Spain
17
Canada
18
Special email
19
Location
20
Price List
21
Fraud
22
Fake Reviews
23
Fakzam
24
Fake antivirus
25
Recommendation cost
26
Remote lock
27
Unlocking
28
Siri
29
Underground Services
30
Current Data
31
Conclusion
Description:
Explore the underground economy surrounding Apple IDs in this 32-minute conference talk from BSidesSF 2017. Delve into real-world attacks affecting millions of users globally, including some that led to arrests. Discover various methods attackers use to obtain Apple IDs and profit from stolen accounts. Learn about Apple's current mitigation efforts and potential future improvements. Gain insights on protecting your own Apple ID using existing solutions. Examine the intricate details of this illicit market, including pricing structures, fraudulent activities, and underground services. Understand the critical importance of Apple IDs in accessing various Apple platforms and services, and why they've become a prime target for cybercriminals.

The Underground Economy of Apple ID

Security BSides San Francisco
Add to list