Главная
Study mode:
on
1
Intro
2
Phones personal devices
3
Broadcasting leakage
4
Solutions
5
Reuter
6
What can you do
7
Mitigation
8
State Surveillance
9
State Control
10
VPN
11
Internet
12
Landing Zones
13
Secondary Authentication
Description:
Explore mobile and wireless attack methods in this 13-minute conference talk from Security BSides London. Learn about target identification, device compromise, and everything in between. Discover various attacks including mobile device traffic sniffing, rogue access point attacks, state surveillance, and corporate network pivoting. Gain insights into broadcasting leakage, mitigation strategies, and the importance of secondary authentication. Understand the implications of state control and the role of VPNs in protecting personal devices. Equip yourself with knowledge to enhance mobile security and implement effective countermeasures against potential threats.

Probe to Pwn - Rookie Track

Security BSides London
Add to list