Completed
Applications
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Emerging Threats in Mobile Computing
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Who are you, and what are you doing here?
- 3 Hacker Fail
- 4 Summary
- 5 Multitude of Devices
- 6 Why do we care?
- 7 Security on Mobile
- 8 Data at Rest
- 9 Data in Motion
- 10 Voice
- 11 Personnel Security Concerns
- 12 Perimeter Security Concerns
- 13 Who owns the data
- 14 Detection/Mitigation Concerns
- 15 Cellular Phone Attack Surface
- 16 SmartPhone Attack Surface
- 17 Browser
- 18 Applications
- 19 Flashlight App
- 20 Cellular Interception
- 21 GSM Interception Under $2000
- 22 IMSI Catching
- 23 Mobile Intercept: Attack Vectors
- 24 Other GSM Attack Vectors
- 25 Remote Access Tools
- 26 Conclusion
- 27 Emerging Threats in Mobile Computing