Description: "With the development of the mobile devices and particularly the iPhones with all the applications that are available for this platform, it is interesting to have ways of knowing what they are really doing. For example some people might be afraid that the e-banking application they are using could leak sensitive information.
This presentation will introduce the iPhone architecture and the methods to reverse engineer iOS applications."
Slides: https://www.hacking-lab.com/nina/show/77
Tags: securitytube , swisscyberstorm , hacking , hackers , information security , convention , computer security , cyber storm 11 , swisscyberstorm 11 , swisscyberstorm-2011 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.