Emerging Threats in Mobile Computing

Emerging Threats in Mobile Computing

LASCON via YouTube Direct link

Who owns the data

13 of 27

13 of 27

Who owns the data

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Emerging Threats in Mobile Computing

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who are you, and what are you doing here?
  3. 3 Hacker Fail
  4. 4 Summary
  5. 5 Multitude of Devices
  6. 6 Why do we care?
  7. 7 Security on Mobile
  8. 8 Data at Rest
  9. 9 Data in Motion
  10. 10 Voice
  11. 11 Personnel Security Concerns
  12. 12 Perimeter Security Concerns
  13. 13 Who owns the data
  14. 14 Detection/Mitigation Concerns
  15. 15 Cellular Phone Attack Surface
  16. 16 SmartPhone Attack Surface
  17. 17 Browser
  18. 18 Applications
  19. 19 Flashlight App
  20. 20 Cellular Interception
  21. 21 GSM Interception Under $2000
  22. 22 IMSI Catching
  23. 23 Mobile Intercept: Attack Vectors
  24. 24 Other GSM Attack Vectors
  25. 25 Remote Access Tools
  26. 26 Conclusion
  27. 27 Emerging Threats in Mobile Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.