SIGINT10 - final10
SIGINT 2010
Konferenz für Netzbewohner, Hacker und Aktivisten
tamhanna
Attack vectors against mobile devices
What endangers mobile devices today? What can be done to mitigate threats? Why are mobile devices especially vulerable?
A similar talk was held at ITU 2009 in Warsaw, and was extremely well-liked by the audience.
Introduction Attacking the hardware Theft How it could be eliminated technically Why this hasn't been done so far(qui bono) Consequences for the victim Attacks on device data Why? Social engineering attacks Device theft for data reasons(how to extract the data) Memory card theft(and how to avoid it) Viruses, etc Attacks on the user's wealth Dialers Callback spam
Plus information on recent developments