YoVDO

Mobile Computing Security

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Wireless Networking Courses VPN Courses Security Awareness Courses Biometrics Courses

Course Description

Overview

Explore mobile computing security challenges and solutions in this Black Hat conference talk. Delve into topics such as intermittently connected clients, conference computer centers, and various authentication methods including passphrases and biometrics. Learn about potential threats like data theft, RF interception, and wireless networking vulnerabilities. Discover strategies for better authentication, security awareness, and information security. Gain insights into ICC hardrick compromise, software tampering, vectoring, VPNs, and peer-to-peer networks. Understand how combining seemingly useless information can pose risks and explore the importance of security measures in HR databases and mobile environments.

Syllabus

Introduction
In intermittently connected clients
In conference computer centers
Passphrases
Biometrics
ICCs
HR Database
ICC
Hardrick Compromise
Data Theft
RF Interception
Wireless Networking
Im on the inside
Combining useless information
Software tampering
Vectoring
VPNs
PeertoPeer
Better Authentication
Security Awareness
Information Security


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube