Security of the Modern Mobile OS

The idea for this blog post came to me during a discussion around some recent research performed by Cisco's Talos threat research group. The post: Advanced Mobile Malware Campaign in India uses Malicious MDM authored by Warren Mercer, Paul Rascagneres and Andrew Williams and the follow-up post containing additional research found here: Part-2. In this … Continue reading Security of the Modern Mobile OS

Using Configurator 2 to prep iOS for CSC

In order to use Cisco Security Connector (CSC) for iOS, the endpoint must first be in supervised mode and managed by an MDM. The easiest way to manage Apple iOS devices is to use Apple's Device Enrollment Program (DEP); which is now rolled into their new Apple Business Manager (ABM) program. However, there are certainly … Continue reading Using Configurator 2 to prep iOS for CSC

Protecting iOS against the aLTEr attacks

Researchers from Ruhr-Universit├Ąt Bochum & New York University Abu Dhabi have uncovered a new attack against devices using the Long-Term Evolution (LTE) network protocol. LTE, which is a form of 4G, is a mobile communications standard used by billions of devices and the largest cellular providers around the world. In other words, the attack can … Continue reading Protecting iOS against the aLTEr attacks