Three Modern Mobile Threats: The Good, the Bad and the Ugly
- Raul Siles
- Wednesday, July 15th, 7:00pm - 8:00pm
Mobile devices are threaten by risky, but very common, user behaviours Do you install third-party apps in your mobile device so that it becomes a real smartphone?, closed integration with the manufacturer platform Did you create an Apple or Google or Microsoft or... account when the mobile device was configured? and technical vulnerabilities Do you have the latest and greatest version of your mobile operating system?.
All these scenarios significantly increase their attack exposure, opening the door to serious device platform compromises, the information they contain, the various user credentials, and as a result, to all the data available in the associated remote services inside the corporate environment or 'in the cloud'. What is the best way to understand this trio than through a live attack scenario targeting Android devices?
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
|Modern Exploitation: How Hackers Hack With Live Demonstrations & Reversing||James Lyne||Monday, July 13th, 6:30pm - 7:30pm||SANS@Night|
|Using an Open Source Threat Model for Prioritized Defense||James Tarala||Tuesday, July 14th, 6:00pm - 7:00pm||SANS@Night|
|Tips for managing IR teams and Execs (in the middle of your incident)!||Steve Armstrong||Tuesday, July 14th, 7:00pm - 8:00pm||SANS@Night|
|Examining Shellcode in a Debugger through Control of the Instruction Pointer||Adam Kramer||Wednesday, July 15th, 6:00pm - 7:00pm||SANS@Night|
|Three Modern Mobile Threats: The Good, the Bad and the Ugly||Raul Siles||Wednesday, July 15th, 7:00pm - 8:00pm||SANS@Night|