Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Grab it
Learn how mobile devices can create critical security vulnerabilities in corporate environments through this 35-minute conference talk from x33fcon. Explore the rising threats of mobile-based spying and spoofing techniques, with specific focus on malware like Pegasus and Hydra that exploit personal devices as cybersecurity blind spots. Gain insights into malware distribution methods, bypassing techniques, deeplinks usage, notification systems, command and control connections, data source vulnerabilities, and advanced concepts like metadata scraping, steganography and image recognition. Understand the potential risks of employee mobile devices compromising expensive corporate security measures and develop strategies to address these emerging threats.
Mobile Device Security Threats: Malware Distribution and Corporate Vulnerabilities - Lecture 3