Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Oct 1, 2012
While targeted attacks are gaining recognition throughout the industry as the new means of industrial espionage, awareness is still aimed at traditional computing devices. However, another class of computers are moving into the focus of adversaries, mobile devices.
Not only do mobile phones allow tracking of personal information, including location, call logs, and audio, they also hold the keys to the kingdom when it comes to access credentials.
This session will focus on mobile threats that have been observed in the wild, the next wave of threats and threat actors, and will conclude with a demo of a seamless targeted attack against an Android ICS device (http://www.youtube.com/watch?v=M2jxLD...).