Главная
Study mode:
on
1
Intro
2
Who are you, and what are you doing here?
3
Hacker Fail
4
Summary
5
Multitude of Devices
6
Why do we care?
7
Security on Mobile
8
Data at Rest
9
Data in Motion
10
Voice
11
Personnel Security Concerns
12
Perimeter Security Concerns
13
Who owns the data
14
Detection/Mitigation Concerns
15
Cellular Phone Attack Surface
16
SmartPhone Attack Surface
17
Browser
18
Applications
19
Flashlight App
20
Cellular Interception
21
GSM Interception Under $2000
22
IMSI Catching
23
Mobile Intercept: Attack Vectors
24
Other GSM Attack Vectors
25
Remote Access Tools
26
Conclusion
27
Emerging Threats in Mobile Computing
Description:
Explore emerging threats in mobile computing through this 51-minute conference talk by Adam Meyers of SRA International at LASCON 2012. Delve into the multitude of mobile devices, security concerns for data at rest and in motion, and personnel and perimeter security issues. Examine the attack surfaces of cellular phones and smartphones, including browser vulnerabilities and application risks. Learn about cellular interception techniques, GSM vulnerabilities, and remote access tools. Gain insights into the evolving landscape of mobile security threats and potential mitigation strategies.

Emerging Threats in Mobile Computing

LASCON
Add to list