Главная
Study mode:
on
1
Introduction
2
Is iOS secure
3
Security failures
4
Whiler Kerr
5
Mask Attacks
6
iOS 9 Vulnerability
7
Xcode Ghost
8
Apples Response
9
Security from attackers point of view
10
App data
11
Executing code
12
Phishing attacks
13
iOS vs Android
14
App Store Review
15
Enterprise Certificate
16
Sam Boxing
17
Data Protection
18
Keychain Items
19
App Transport Security
20
TLS 102
21
Certificate Authorities
22
AFNetworking
23
Demos
24
XcodeGhost
25
Summary
Description:
Explore iOS security threats and mitigations in this 47-minute conference talk from GOTO Copenhagen 2015. Gain insights from Emil Kvarnhammar, CEO at TrueSec Syd AB, as he delves into iOS architecture security, malware examples, and successful attacks. Learn about security failures, iOS vulnerabilities, and Apple's responses. Understand the attacker's perspective on app data, code execution, and phishing attacks. Compare iOS and Android security measures, and examine App Store review processes, enterprise certificates, and sandboxing. Discover data protection techniques, keychain items, and App Transport Security. Explore TLS 1.0.2, certificate authorities, and AFNetworking. Watch live demos, including an XcodeGhost demonstration, to enhance your understanding of iOS security threats and mitigation strategies.

Security Threats & Mitigations for iOS Developers

GOTO Conferences
Add to list