CyberSecurity Summary

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It


Listen Later

This excerpt is from the book "Hacking and Securing iOS Applications" by Jonathan Zdziarski. The book provides a comprehensive guide to the vulnerabilities of iOS devices and applications. It explores various attack methods, including forensic trace analysis, exploiting the Objective-C runtime, and hijacking traffic. Additionally, it offers counter-forensic techniques and security measures that developers can implement to protect their applications and user data. The book also highlights the importance of strong passphrases and key derivation functions for secure encryption.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Get the Book now from Amazon:
https://www.amazon.com/Hacking-Securing-iOS-Applications-Hijacking-ebook/dp/B006ZN9ZP2?&linkCode=ll1&tag=cvthunderx-20&linkId=61ce3fd9b230a556c9ea237ae3f1a941&language=en_US&ref_=as_li_ss_tl

...more
View all episodesView all episodes
Download on the App Store

CyberSecurity SummaryBy CyberSecurity Summary