Predatory Hacking of Mobile: Real Demos
Sneak behind enemy lines to learn how hackers can grab data off mobile devices. Live demos of information thievery on iOS and Android devices paired with recommendations on how to stop these threats. Multiple threat vectors are covered including: physical device access, WiFi and the downloading of malicious apps. Presented by the team that uncovered the Android “Master Key” vulnerability.