The Making of: The Good, The Bad and The Ugly
- Raul Siles
- Wednesday, November 18th, 6:00pm - 7:00pm
Mobile devices are threaten by risky, but very common, user behaviours Do you install third-party apps in your mobile device‚¶ so that it becomes a real smartphone?, closed integration with the manufacturer platform Did you create an Apple or Google or Microsoft account when the mobile device was configured? and technical vulnerabilities Do you have the latest and greatest version of your mobile operating system? All these scenarios significantly increase their attack exposure, opening the door to serious device platform compromises, the information they contain, the various user credentials, and as a result, to all the data available in the associated remote services, inside the corporate environment or "in the cloud". What is the best way to understand this trio than through a live attack scenario targeting Android devices?
During the SANS London in the Summer 2015 conference we enjoyed the public premiere of the "Three Modern Mobile Threats: The Good, the Bad and the Ugly‚ presentation. This making-of presentation provides the backstage technical details of how the attack was designed and executed.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.