SIGINT10 - final10

SIGINT 2010
Konferenz für Netzbewohner, Hacker und Aktivisten

tamhanna

Attack vectors against mobile devices

What endangers mobile devices today? What can be done to mitigate threats? Why are mobile devices especially vulerable?

A similar talk was held at ITU 2009 in Warsaw, and was extremely well-liked by the audience.

Introduction Attacking the hardware Theft How it could be eliminated technically Why this hasn't been done so far(qui bono) Consequences for the victim Attacks on device data Why? Social engineering attacks Device theft for data reasons(how to extract the data) Memory card theft(and how to avoid it) Viruses, etc Attacks on the user's wealth Dialers Callback spam

Plus information on recent developments