Completed
HRH - Attack Flow
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Mobile Security Attacks - A Glimpse from the Trenches
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 A Holistic Outlook on Mobile Security
- 3 The Physical Layer
- 4 Real World Incident Statistics
- 5 Network Based Attacks
- 6 Implementation-Based Vulnerabilities
- 7 Gotofail - The Code
- 8 Design-Based Vulnerabilities (Generic)
- 9 IOS Security Model
- 10 Configuration Profiles
- 11 Demo: Participation Instructions
- 12 Malicious Profiles
- 13 Design-Based Vulnerabilities (Mobile)
- 14 App Level Security & Privacy
- 15 App Level Vulnerabilities
- 16 Certificate Pinning
- 17 HRH - Attack Flow
- 18 Google's Focus on Malware
- 19 The Maliciously Vulnerable App
- 20 Summary