Practical Attacks Against MDM Solutions

  • Tuesday, July 22, 2014 | 13.00 – 13.45 hrs | Sands Level 4 | Room: Peony 4505

View all Sessions

How are mobile cyber-espionage attacks carried out? In this engaging session, we demonstrate how attackers bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption. The talk includes live demos against Android and iOS-based devices and discusses practical mitigation measures to defend against similar threats.


This document was retrieved from on Tue, 25 Oct 2016 20:28:36 -0400.
© 2016 EMC Corporation. All rights reserved.