Knowledge Is Power: Using Cyber Scrutiny To Defend Against Phishing Attacks

posted by: on October 23, 2014 5:00 AM

filed in: Cybersecurity, Malware, Threat Prevention, Web Security
tagged: ,

If you purchased an iPhone 6 recently, you probably received this email:

apple email

Some of you may have even clicked the “Verify Now” link and entered your Apple ID account information. I hope not, though, because this email is not from Apple. It’s a phishing email meant to trick recipients into giving sensitive information to the attacker who sent it.

This email illustrates two things: …Continue reading


Privacy: Why Apple Pay will be Better than Google Wallet

posted by: on September 18, 2014 4:00 PM

filed in: Mobility, Unit 42
tagged: , , , ,

On September 9, Apple announced that the latest iPhone models would come with a new technology called Apple Pay which allows people to purchase items with their phones, both in stores and online. Many smug Android users looked at the announcement and thought “Sounds like Google Wallet. Welcome to 2011 Apple.” As an individual who is well entrenched in the Google ecosystem, (I have a Nexus 5 on in my pocket and a Moto 360 on my wrist) I initially had the same reaction. But, after looking at the two systems more closely, I think Apple Pay will be the better platform for users, and the reason for that is privacy.

apple pay v google wallet …Continue reading


What’s APPening with Apple FaceTime

posted by: on August 5, 2010 4:51 PM

filed in: Uncategorized
tagged: , , , , , , , ,

As the Antenna-gate controversy raged and finally subsided, the team here was busy enhancing our App-ID technology to identify Apple’s new video calling feature – FaceTime. It is essentially the audio-video chat functionality of Apple’s iChat for desktops, but tied to the iPhone4 device. From our analysis of the network traffic of FaceTime, we discovered that it uses SIP, the industry standard protocol for VoIP telephony, STUN for NAT traversal, and XMPP over SSL for authentication with Apple.

Since it relies on Wi-Fi connectivity, corporate networks will have to carry this traffic as employees begin to use it inside the Enterprise. For enterprises that do not want to install and manage their own SIP network, it serves as an out-of-the-box mobile video calling solution.

However, some security admins are wary about the numerous ports that must be opened in their firewalls to allow FaceTime calling. …Continue reading