Practical Attacks against MDM Solutions (and What Can You Do About It)

  • Thursday, February 27, 2014 | 9:20 AM – 10:20 AM | West | Room: 2003

View all Sessions

How are mobile cyber-espionage attacks carried out? In this engaging session, we will show how attackers bypass traditional mobile malware detection measures—and even circumvent common Mobile Device Management (MDM) features, such as encryption. The talk includes live demos against Android and iOS-based devices and discusses practical mitigation measures to defend against similar mobile threats.


This document was retrieved from on Sat, 23 Feb 2019 05:45:06 -0500.