Completed
GSM Interception Under $2000
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Emerging Threats in Mobile Computing
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Who are you, and what are you doing here?
- 3 Hacker Fail
- 4 Summary
- 5 Multitude of Devices
- 6 Why do we care?
- 7 Security on Mobile
- 8 Data at Rest
- 9 Data in Motion
- 10 Voice
- 11 Personnel Security Concerns
- 12 Perimeter Security Concerns
- 13 Who owns the data
- 14 Detection/Mitigation Concerns
- 15 Cellular Phone Attack Surface
- 16 SmartPhone Attack Surface
- 17 Browser
- 18 Applications
- 19 Flashlight App
- 20 Cellular Interception
- 21 GSM Interception Under $2000
- 22 IMSI Catching
- 23 Mobile Intercept: Attack Vectors
- 24 Other GSM Attack Vectors
- 25 Remote Access Tools
- 26 Conclusion
- 27 Emerging Threats in Mobile Computing