1. A Walk Through Mono Menulet

    04:46

    from charlesism Added 16 0 0

    This is a demo of Mono Menulet for OS X, a small app for OS X. Mono Menulet gives you easy access to "Play stereo audio as mono." It is available from http://charlesism.com

    + More details
    • Formation vidéo Apprendre Photos - L'application d'Apple avec Elephorm

      01:55

      from elephorm Added 1 0 0

      Teaser de la formation Apprendre Photos - L'application d'Apple avec Benoît Aragou. Retrouvez la formation complète : http://www.elephorm.com/apprendre-photos-ios-osx Retrouvez nous sur : Facebook - https://www.facebook.com/elephorm Twitter - https://twitter.com/elephorm LinkedIn - https://fr.linkedin.com/company/elephorm

      + More details
      • CleanMyMac 3

        01:09

        from Rémi Cormier Added 14 0 0

        CleanMyMac 3 en démonstration rapide.

        + More details
        • Neil Archibald (a.k.a. Nemo), Accuvant Labs: "Exploitation of memory corruption bugs utilizing the Objective-C runtime on Mac OS

          47:19

          from The CyberWire Added

          It's rare to find a standalone information leak, and Archibald outlines ways of achieving remote execution without such a leak. Some of the exploit techniques he describes include avenues newly opened by vendor upgrades. Presented at the Jailbreak Security Summit, May 8, 2015, Laurel, Maryland, USA.

          + More details
          • Ian Beer, Google Project Zero: "A deep-dive into the many flavors of IPC available on OS X."

            01:09:10

            from The CyberWire Added

            An overview of most IPC mechanisms on iOS/OS X. A quick look at Mach Message fundamentals is followed by a deep-dive into XPC services and the exploitation bugs therein. Beer describes privilege escalation models and unsafe versions of the XPC Services API. He concludes with a call for stronger security and for more effective sandboxing. Presented at the Jailbreak Security Summit, May 8, 2015, Laurel, Maryland, USA.

            + More details
            • Dale Robson, CyberPoint International: "How OS X malware is upping its game."

              47:35

              from The CyberWire Added

              Robson considers Mac sandboxes and malware, addressing the sandbox problem from the perspective of a reverse engineer. He asks the audience to consider how "basic irritants" interact with the Internet. He also asks them to consider controls: privilege separation, signature checks, hardening, behavioral limitation, containers, etc. After outlining possibilities, he offers an explanation of the general lack of publicly available sandbox escapes in terms of the economic realities of crimeware. Presented at the Jailbreak Security Summit, May 8, 2015, Laurel, Maryland, USA.

              + More details
              • Tao Wei and Zhaofeng Chen, FireEye: "A full disclosure of the Masque Attacks, including more than five vulnerabilities."

                40:16

                from The CyberWire Added

                The presenters describe spearphishing against iOS and the Masque attacks. Spearphishing against iOS is easy, effective, flexible, and persistent. They find, however, few malware instances for non-jailbroken iOS devices. They outline the details of four Masque attacks. Presented at the Jailbreak Security Summit, May 8, 2015, Laurel, Maryland, USA.

                + More details
                • Chris Forant, Booz Allen Hamilton: "What does a 'secure' OS look like?"

                  01:06:20

                  from The CyberWire Added

                  iOS is highly controlled, with excellent sandboxing. But much can go wrong with apps developed for this mobile OS, mostly stemming from developer unfamiliarity with security. Such missteps are illustrated with a detailed case study demonstrating the development of a fictitious secret-storing app's development (and the interaction between developers and testers). Presented at the Jailbreak Security Summit, May 8, 2015, Laurel, Maryland, USA.

                  + More details
                  • Patrick Wardle, Synack: "How to practically create elegant, bad@ss OS X malware."

                    01:03:21

                    from The CyberWire Added

                    There are lots of unknown unknowns with respect to OS X malware. Mac's increasing market share is sure to draw attention on the malware black market, and to drive development of appropriate malware. Even today, Mac malware, despite impressions to the contrary, is very much a reality. While not at present terribly capable, it could easily be swiftly enhanced. Presented at the Jailbreak Security Summit, May 8, 2015, Laurel, Maryland, USA.

                    + More details
                    • Jailbreak Security Summit, Jailbreak Brewery

                      00:48

                      from The CyberWire Added

                      Apple security is drawing more attention from researchers' as Mac and iOS devices become increasingly important in the enterprise. Threats evolve differently in the Mac ecosystem from the way they do in the better-understood Windows environment. The Jailbreak Security Summit assembled experts to consider the work of researchers into this increasingly important space. (And it was hosted by a production brewery—the Jailbreak Brewery—perhaps a first for cyber security symposia.) Sponsors included CyberPoint International, Booz Allen Hamilton, FireEye, ClearShark, Novetta, Blackpoint Technologies, Endgame, and Synack. Presented at the Jailbreak Security Summit, May 8, 2015, Laurel, Maryland, USA.

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."