Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the evolution of iOS commercial spyware in this one-hour conference talk from the 38th Chaos Communication Congress (38C3). Dive into the progression of iOS spyware from Pegasus's initial discovery in 2016 through to current threats in 2024, examining how exploit chains, infection vectors, and methodologies have transformed over time. Learn about advanced detection techniques and forensic data sources, including a detailed case study of the BlastPass exploit used by NSO Group. Examine technical challenges and limitations in current detection approaches, while understanding potential improvements that could enhance spyware detection capabilities. Through four comprehensive segments covering spyware evolution, detection advancements, current challenges, and future recommendations, gain actionable insights into the commercial spyware landscape and its impact on iOS security. Presented by Matthias Frielingsdorf, this talk provides security researchers, developers, and privacy advocates with valuable knowledge about past developments, present threats, and future directions in iOS spyware detection and prevention.
Syllabus
38C3 - From Pegasus to Predator - The evolution of Commercial Spyware on iOS
Taught by
media.ccc.de