|
You are here |
f1tym1.com | ||
| | | | |
blog.quarkslab.com
|
|
| | | | | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip. | |
| | | | |
www.peerreviewed.io
|
|
| | | | | The sharp increase in reports of people being unknowingly tracked by bad actors using AirTags is clearly indicative of a major problem - but the question I've been wrestling with since these stories began is "Has Apple made the problem of stalking worse with AirTags, or just easier to discover?" | |
| | | | |
positive.security
|
|
| | | | | We built an AirTag clone capable of silently and continuously tracking someone. The device accomplishes this by sending just one beacon per generated public key, thereby staying invisible to tracking notifications for iOS users and Apple's Tracker Detect Android app. | |
| | | | |
cyble.com
|
|
| | | Cyble analyzes stealthy and sophisticated malware capable of bypassing Chrome's app-bound encryption via dual injection techniques. | ||