BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/5704020041662464/lesson/fbc1d710421e31bd85bf3fef7241c8fc?ref=outlook-calendar
SUMMARY:Software and the Cloud
DTSTART;TZID=America/Los_Angeles:20260502T190000
DTEND;TZID=America/Los_Angeles:20260502T200000
LOCATION:https://www.learndesk.us/class/5704020041662464/lesson/fbc1d710421e31bd85bf3fef7241c8fc?ref=outlook-calendar
DESCRIPTION: 
In this video, we'll explore what an attacker could do via software or the cloud.

This last and most prevalent vector of attack can be broken down into three parts:

The Operating System-level (so iOS or Android)
The application level
Through the cloud


Out of the box, iOS and Android are relatively safe, because of the built-in security mechanisms that are put in place. I say "relatively" because there will always be bugs that will be found and need to be patched as soon as possible.
One example is when a vulnerability in rendering images is discovered and so a specially crafted picture could be used to compromise a device, sometimes without user interaction, just by receiving a message for instance.

Problems arise when built-in security mechanisms are broken or bypassed on purpose.
For iPhones, we talk about "jailbreaking" a device, which removes the restrictions imposed by Apple, one of which is the ability to install apps outside of the official App Store. In the Android...

https://www.learndesk.us/class/5704020041662464/lesson/fbc1d710421e31bd85bf3fef7241c8fc?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR