Predatory Hacking of Mobile: Real Demos

  • Wednesday, February 26, 2014 | 10:40 AM – 11:40 AM | West | Room: 2003
View all Sessions

Sneak behind enemy lines to learn how hackers can grab data off mobile devices. Live demos of information thievery on iOS and Android devices paired with recommendations on how to stop these threats. Multiple threat vectors are covered including: physical device access, WiFi and the downloading of malicious apps. Presented by the team that uncovered the Android “Master Key” vulnerability.

Participants

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions/1299/predatory-hacking-of-mobile-real-demos on Tue, 29 Jul 2014 10:48:34 -0400.
© 2014 EMC Corporation. All rights reserved.