Menu

Predatory Hacking of Mobile: Real Demos

  • Wednesday, February 26, 2014 | 10:40 AM – 11:40 AM | West | Room: 2003
View all Sessions

Sneak behind enemy lines to learn how hackers can grab data off mobile devices. Live demos of information thievery on iOS and Android devices paired with recommendations on how to stop these threats. Multiple threat vectors are covered including: physical device access, WiFi and the downloading of malicious apps. Presented by the team that uncovered the Android “Master Key” vulnerability.

Participants

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions/1299/predatory-hacking-of-mobile-real-demos on Fri, 19 Dec 2014 22:00:50 -0500.
© 2014 EMC Corporation. All rights reserved.