Mobile Attacks: Separating Hype From Reality

  • Thursday, February 28, 2013 | 1:00 PM – 2:00 PM | Room: Room 306

View all Sessions

This session addresses the hype about attacks on mobile devices. Having written exploits for most mobile platforms, I'll explore mobile OS exploits and how the OS defends itself, how easy (or hard) it is to write exploits and malware, and how mobile security software works (or doesn't). You'll be in a much better position to determine the risk mobile devices present and the reality from the hype.


This document was retrieved from on Sun, 29 Nov 2015 05:33:49 -0500.
© 2015 EMC Corporation. All rights reserved.