YoVDO

Emerging Threats in Mobile Computing

Offered By: LASCON via YouTube

Tags

LASCON Courses Data Security Courses Mobile Security Courses Perimeter Security Courses

Course Description

Overview

Explore emerging threats in mobile computing through this 51-minute conference talk by Adam Meyers of SRA International at LASCON 2012. Delve into the multitude of mobile devices, security concerns for data at rest and in motion, and personnel and perimeter security issues. Examine the attack surfaces of cellular phones and smartphones, including browser vulnerabilities and application risks. Learn about cellular interception techniques, GSM vulnerabilities, and remote access tools. Gain insights into the evolving landscape of mobile security threats and potential mitigation strategies.

Syllabus

Intro
Who are you, and what are you doing here?
Hacker Fail
Summary
Multitude of Devices
Why do we care?
Security on Mobile
Data at Rest
Data in Motion
Voice
Personnel Security Concerns
Perimeter Security Concerns
Who owns the data
Detection/Mitigation Concerns
Cellular Phone Attack Surface
SmartPhone Attack Surface
Browser
Applications
Flashlight App
Cellular Interception
GSM Interception Under $2000
IMSI Catching
Mobile Intercept: Attack Vectors
Other GSM Attack Vectors
Remote Access Tools
Conclusion
Emerging Threats in Mobile Computing


Taught by

LASCON

Related Courses

Comparing WAF and RASP - Why?
LASCON via YouTube
API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube
Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube
Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube
Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube