Predatory Hacking of Mobile: Real Demos

  • Wednesday, February 26, 2014 | 10:40 AM – 11:40 AM | West | Room: 2003

View all Sessions

Sneak behind enemy lines to learn how hackers can grab data off mobile devices. Live demos of information thievery on iOS and Android devices paired with recommendations on how to stop these threats. Multiple threat vectors are covered including: physical device access, WiFi and the downloading of malicious apps. Presented by the team that uncovered the Android “Master Key” vulnerability.


This document was retrieved from on Tue, 31 May 2016 01:57:04 -0400.
© 2016 EMC Corporation. All rights reserved.