Predatory Hacking of Mobile: Real Demos

  • Wednesday, February 26, 2014 | 10:40 AM – 11:40 AM | West | Room: 2003

View all Sessions

Sneak behind enemy lines to learn how hackers can grab data off mobile devices. Live demos of information thievery on iOS and Android devices paired with recommendations on how to stop these threats. Multiple threat vectors are covered including: physical device access, WiFi and the downloading of malicious apps. Presented by the team that uncovered the Android “Master Key” vulnerability.


This document was retrieved from on Fri, 19 Jul 2019 05:26:22 -0400.