Shaare your links...
3325 links
L!NKS Retour au blog Login RSS Feed ATOM Feed Tag cloud Picture wall Daily
Links per page: 20 50 100
page 1 / 1
2 results for tags smartphone x
  • DolphinAttack: Inaudible Voice Commands - 50cf379143925a3926298f881d3c19ab-applicationpdf.pdf
    Comment donner des ordres à un téléphone avec des sons inaudbles (>20kHz): "ok google ..., siri,..., cortnana,..."
    Les possibilités sont vastes :
    (1) Visiting a malicious website.
    The device can open a malicious
    website, which can launch a drive-by-download attack or
    exploit a device with 0-day vulnerabilities.
    (2) Spying.
    An adversary can make the victim device initiate
    outgoing video/phone calls, therefore getting access to the
    image/sound of device surroundings.
    (3) Injecting fake information.
    An adversary may instruct the vic-
    tim device to send fake text messages and emails, to publish
    fake online posts, to add fake events to a calendar, etc.
    (4) Denial of service.
    An adversary may inject commands to turn
    on the airplane mode, disconnecting all wireless communi-
    cations.
    (5) Concealing attacks.
    The screen display and voice feedback
    may expose the attacks. The adversary may decrease the
    odds by dimming the screen and lowering the volume

    ;-)
    permalink -
    - https://endchan.xyz/.media/50cf379143925a3926298f881d3c19ab-applicationpdf.pdf
    smartphone sécurité
  • Replicant découvre un backdoor dans les smarphones Samsung Galaxy et propose une solution pour protéger les utilisateurs
    permalink -
    - http://www.developpez.com/actu/68897/Replicant-decouvre-un-backdoor-dans-les-smarphones-Samsung-Galaxy-et-propose-une-solution-pour-proteger-les-utilisateurs/
    android backdoor smartphone
Links per page: 20 50 100
page 1 / 1
Shaarli 0.0.41 beta - The personal, minimalist, super-fast, no-database delicious clone. By sebsauvage.net. Theme by idleman.fr.