Today I delivered the first of a trilogy of webcasts promoting my new course with the SANS Institute “Mobile Device Security and Ethical Hacking” (Security 575). In the presentation we look at the threat of lost or stolen mobile devices, examining how an attacker can use backup tools to extract data from mobile devices, bypass PIN authentication on Apple iOS and BlackBerry devices, and how to mitigate the impact of lost devices. Check it out!
-Josh
Print
Share
Comment
Cite
Upload
Translate
APA
() » Invasion of the Mobile Phone Snatchers. Retrieved from https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/.
MLA" » Invasion of the Mobile Phone Snatchers." - , https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/
HARVARD » Invasion of the Mobile Phone Snatchers., viewed ,
VANCOUVER - » Invasion of the Mobile Phone Snatchers. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/
CHICAGO" » Invasion of the Mobile Phone Snatchers." - Accessed . https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/
IEEE" » Invasion of the Mobile Phone Snatchers." [Online]. Available: https://www.truth.cx/2012/06/01/invasion-of-the-mobile-phone-snatchers/. [Accessed: ]