Invasion of the Mobile Phone Snatchers

Today I delivered the first of a trilogy of webcasts promoting my new course with the SANS Institute “Mobile Device Security and Ethical Hacking” (Security 575). In the presentation we look at the threat of lost or stolen mobile devices, … Continue reading

Slide Title Presentation PageToday I delivered the first of a trilogy of webcasts promoting my new course with the SANS Institute “Mobile Device Security and Ethical Hacking” (Security 575). In the presentation we look at the threat of lost or stolen mobile devices, examining how an attacker can use backup tools to extract data from mobile devices, bypass PIN authentication on Apple iOS and BlackBerry devices, and how to mitigate the impact of lost devices. Check it out!

-Josh


Print Share Comment Cite Upload Translate
APA
() » Invasion of the Mobile Phone Snatchers. Retrieved from https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/.
MLA
" » Invasion of the Mobile Phone Snatchers." - , https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/
HARVARD
» Invasion of the Mobile Phone Snatchers., viewed ,
VANCOUVER
- » Invasion of the Mobile Phone Snatchers. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/
CHICAGO
" » Invasion of the Mobile Phone Snatchers." - Accessed . https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/
IEEE
" » Invasion of the Mobile Phone Snatchers." [Online]. Available: https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/. [Accessed: ]
Select a language: