Mobile gaming applications aimed specifically at children are creating a backdoor means of gaining access into a variety of devices. This session will discuss how these apps start as benign downloads but during use, develop into key transit nodes for moving data out of the user’s hands and into an attacker’s hands.
1: Learn from findings of research into online child games.
2: Understand the security vulnerabilities discovered.
3: Explore the longer-term implications of this trend.
Mobile & IoT Security
Internet of Things endpoint security data security cyber warfare & cyber weapons anti-malware
Share With Your Community