Hacking Smart Phones

In this webcast, the presenter will take a look at the Smartphone attack surface, only from and end-to-end point of view. The baseband type stuff and things owned by the telco's will not be covered. Basically, it'll cover 5 major areas: identifying operating systems (through for example the user-agent with mms), identifying entry points, identifying trust boundaries, identifying bugs and exploiting bugs.

Provided by: SecurityTube.net Topic: Security Date Added: Sep 2014 Format: Webcast

Find By Topic