This talk will present a look at the rapidly evolving space of targeted espionage attacks against mobile devices. We will examine the way that highly resourced actors use targeted software that they wrote or purchased (from actors such as NSO Group and Hacking Team) and how that software affects targeted devices, including a deep dive into the technical features of examples of this software.
Mobile & IoT Security
software code vulnerability analysis zero day vulnerability exploit of vulnerability
Share With Your Community