Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore mobile device vulnerabilities and potential attacks in this 15-minute Security BSides London conference talk. Discover how devices like Raspberry Pi and USB-OTG accessories can be used to compromise rooted Android devices, including methods for inserting malicious files. Examine the consequences of rooted devices and investigate the possibility of programmatically rooting a device using a Raspberry Pi, documenting challenges encountered during the process. Consider the security implications of new charging port designs, particularly USB ports that could potentially conceal malicious hardware. Additionally, gain insights into past vulnerabilities associated with other mobile operating systems, such as iOS.