The proof of concept will be presented by the institute at Black Hat USA 2013– giving you another good reason to come to the conference (visiting the Checkmarx booth).
Although Apple iOS devices are considered to be extremely secured, this experiment proved that it is easy to threat the security of one’s phone. This article introduces a detailed explanation of how to hack a phone with a charger and more importantly, how Apple can prevent this from happening.
Go to source.
Sign up today & never miss an update from the Checkmarx blog
Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.
Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.