際際滷shows by User: LacoonMobileSecurity / http://www.slideshare.net/images/logo.gif 際際滷shows by User: LacoonMobileSecurity / Thu, 19 Feb 2015 10:32:38 GMT 際際滷Share feed for 際際滷shows by User: LacoonMobileSecurity Mobile Threats: Enterprises Under Attack /slideshow/lacoon-check-pointmratreport/44886170 lacoon-checkpoint-mrat-report-150219103238-conversion-gate02
]]>

]]>
Thu, 19 Feb 2015 10:32:38 GMT /slideshow/lacoon-check-pointmratreport/44886170 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) Mobile Threats: Enterprises Under Attack LacoonMobileSecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lacoon-checkpoint-mrat-report-150219103238-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Mobile Threats: Enterprises Under Attack from Lacoon Mobile Security
]]>
603 4 https://cdn.slidesharecdn.com/ss_thumbnails/lacoon-checkpoint-mrat-report-150219103238-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructure (VDI) /slideshow/bh-us-attacksvdi/38040987 bhusattacksvdi-140815225936-phpapp01
CEO Michael Shaulov and Sr. Security Researcher Daniel Brodie will be presenting A Practical Attack Against VDI Solutions at this years conference in Las Vegas.]]>

CEO Michael Shaulov and Sr. Security Researcher Daniel Brodie will be presenting A Practical Attack Against VDI Solutions at this years conference in Las Vegas.]]>
Fri, 15 Aug 2014 22:59:36 GMT /slideshow/bh-us-attacksvdi/38040987 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructure (VDI) LacoonMobileSecurity CEO Michael Shaulov and Sr. Security Researcher Daniel Brodie will be presenting A Practical Attack Against VDI Solutions at this years conference in Las Vegas. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bhusattacksvdi-140815225936-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> CEO Michael Shaulov and Sr. Security Researcher Daniel Brodie will be presenting A Practical Attack Against VDI Solutions at this years conference in Las Vegas.
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructure (VDI) from Lacoon Mobile Security
]]>
2366 9 https://cdn.slidesharecdn.com/ss_thumbnails/bhusattacksvdi-140815225936-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
"Bleeding-In-The-Browser" - Why reverse Heartbleed risk is dangerous to the Enterprise /slideshow/bleeding-inthebrowser/34029314 bleeding-in-the-browser-140428083405-phpapp02
This Bleeding-In-The-Browser attack scenario is a highly common scenario that exploits an Android 4.1.1 mobile browser to steal credentials and session cookies using reverse Heartbleed. This presentation illustrates how easily an attacker can steal your Enterprise data with social engineering techniques as well as tips for protecting your Enterprise data from Bleeding-in-the-Browser / client-side Heartbleed. ]]>

This Bleeding-In-The-Browser attack scenario is a highly common scenario that exploits an Android 4.1.1 mobile browser to steal credentials and session cookies using reverse Heartbleed. This presentation illustrates how easily an attacker can steal your Enterprise data with social engineering techniques as well as tips for protecting your Enterprise data from Bleeding-in-the-Browser / client-side Heartbleed. ]]>
Mon, 28 Apr 2014 08:34:04 GMT /slideshow/bleeding-inthebrowser/34029314 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) "Bleeding-In-The-Browser" - Why reverse Heartbleed risk is dangerous to the Enterprise LacoonMobileSecurity This Bleeding-In-The-Browser attack scenario is a highly common scenario that exploits an Android 4.1.1 mobile browser to steal credentials and session cookies using reverse Heartbleed. This presentation illustrates how easily an attacker can steal your Enterprise data with social engineering techniques as well as tips for protecting your Enterprise data from 鐃Bleeding-in-the-Browser / client-side Heartbleed. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bleeding-in-the-browser-140428083405-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This Bleeding-In-The-Browser attack scenario is a highly common scenario that exploits an Android 4.1.1 mobile browser to steal credentials and session cookies using reverse Heartbleed. This presentation illustrates how easily an attacker can steal your Enterprise data with social engineering techniques as well as tips for protecting your Enterprise data from 鐃Bleeding-in-the-Browser / client-side Heartbleed.
"Bleeding-In-The-Browser" - Why reverse Heartbleed risk is dangerous to the Enterprise from Lacoon Mobile Security
]]>
1793 2 https://cdn.slidesharecdn.com/ss_thumbnails/bleeding-in-the-browser-140428083405-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation /slideshow/ios-threats-malicious-configuration-profiles-threat-detection-mitigation/32325282 ios-malicousconfigurationprofiles-140314134327-phpapp01
A profile is an extremely sensitive optional configuration file which allows to re-define different system functionality parameters such as mobile carrier settings, Mobile Device Management (MDM) settings and networking settings. Through social engineering techniques such as email phishing or a fake URL, an attacker can convince a user to install a malicious profile and compromise the device settings to silently route network traffic from the device to a remote proxy over SSL using a self-signed certificate. The impact: Once the attacker has re-routed all traffic from the mobile device to their own server, they can begin to install other malicious apps and decrypt SSL communications.]]>

A profile is an extremely sensitive optional configuration file which allows to re-define different system functionality parameters such as mobile carrier settings, Mobile Device Management (MDM) settings and networking settings. Through social engineering techniques such as email phishing or a fake URL, an attacker can convince a user to install a malicious profile and compromise the device settings to silently route network traffic from the device to a remote proxy over SSL using a self-signed certificate. The impact: Once the attacker has re-routed all traffic from the mobile device to their own server, they can begin to install other malicious apps and decrypt SSL communications.]]>
Fri, 14 Mar 2014 13:43:27 GMT /slideshow/ios-threats-malicious-configuration-profiles-threat-detection-mitigation/32325282 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation LacoonMobileSecurity A profile is an extremely sensitive optional configuration file which allows to re-define different system functionality parameters such as mobile carrier settings, Mobile Device Management (MDM) settings and networking settings. Through social engineering techniques such as email phishing or a fake URL, an attacker can convince a user to install a malicious profile and compromise the device settings to silently route network traffic from the device to a remote proxy over SSL using a self-signed certificate. The impact: Once the attacker has re-routed all traffic from the mobile device to their own server, they can begin to install other malicious apps and decrypt SSL communications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ios-malicousconfigurationprofiles-140314134327-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A profile is an extremely sensitive optional configuration file which allows to re-define different system functionality parameters such as mobile carrier settings, Mobile Device Management (MDM) settings and networking settings. Through social engineering techniques such as email phishing or a fake URL, an attacker can convince a user to install a malicious profile and compromise the device settings to silently route network traffic from the device to a remote proxy over SSL using a self-signed certificate. The impact: Once the attacker has re-routed all traffic from the mobile device to their own server, they can begin to install other malicious apps and decrypt SSL communications.
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation from Lacoon Mobile Security
]]>
3218 5 https://cdn.slidesharecdn.com/ss_thumbnails/ios-malicousconfigurationprofiles-140314134327-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Amphion Forum 2013: What to Do About Attacks Against MDMs /slideshow/amphion-forum-2013-what-to-do-about-attacks-against-mdms/29238812 attacksagainstmdmsolutions-131216011138-phpapp02
]]>

]]>
Mon, 16 Dec 2013 01:11:38 GMT /slideshow/amphion-forum-2013-what-to-do-about-attacks-against-mdms/29238812 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) Amphion Forum 2013: What to Do About Attacks Against MDMs LacoonMobileSecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/attacksagainstmdmsolutions-131216011138-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Amphion Forum 2013: What to Do About Attacks Against MDMs from Lacoon Mobile Security
]]>
1381 3 https://cdn.slidesharecdn.com/ss_thumbnails/attacksagainstmdmsolutions-131216011138-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
An Overview of mRATs /LacoonMobileSecurity/an-overview-of-mrats anoverviewofmrats-131211184644-phpapp01
]]>

]]>
Wed, 11 Dec 2013 18:46:44 GMT /LacoonMobileSecurity/an-overview-of-mrats LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) An Overview of mRATs LacoonMobileSecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/anoverviewofmrats-131211184644-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
An Overview of mRATs from Lacoon Mobile Security
]]>
1067 2 https://cdn.slidesharecdn.com/ss_thumbnails/anoverviewofmrats-131211184644-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It) /slideshow/mobilecon-2013-attacks-aginst-mdm-solutions-and-what-you-can-do-about-it/27455866 mobilecon2013attacksagainstmdmandwhatyoucandoaboutit-131022104608-phpapp01
]]>

]]>
Tue, 22 Oct 2013 10:46:08 GMT /slideshow/mobilecon-2013-attacks-aginst-mdm-solutions-and-what-you-can-do-about-it/27455866 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It) LacoonMobileSecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobilecon2013attacksagainstmdmandwhatyoucandoaboutit-131022104608-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
MobileCON 2013 Attacks Aginst MDM Solutions (and What You Can Do About It) from Lacoon Mobile Security
]]>
745 6 https://cdn.slidesharecdn.com/ss_thumbnails/mobilecon2013attacksagainstmdmandwhatyoucandoaboutit-131022104608-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions /slideshow/ip-expo-2013-anatomy-of-a-targeted-attack-on-mdm-solutions/27455842 ipexpo2013-anatomyofatargetedattackonmdmsolutions-131022104519-phpapp01
]]>

]]>
Tue, 22 Oct 2013 10:45:19 GMT /slideshow/ip-expo-2013-anatomy-of-a-targeted-attack-on-mdm-solutions/27455842 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions LacoonMobileSecurity <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ipexpo2013-anatomyofatargetedattackonmdmsolutions-131022104519-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions from Lacoon Mobile Security
]]>
906 6 https://cdn.slidesharecdn.com/ss_thumbnails/ipexpo2013-anatomyofatargetedattackonmdmsolutions-131022104519-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
How Mobile Malware Bypasses Secure Containers /slideshow/how-mobile-malware-bypasses-secure-containers/27139256 howmobilemalwarebypassessecurecontainers-131013020951-phpapp02
How does mobile malware bypass secure containers, wrappers and MDM?]]>

How does mobile malware bypass secure containers, wrappers and MDM?]]>
Sun, 13 Oct 2013 02:09:51 GMT /slideshow/how-mobile-malware-bypasses-secure-containers/27139256 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) How Mobile Malware Bypasses Secure Containers LacoonMobileSecurity How does mobile malware bypass secure containers, wrappers and MDM? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howmobilemalwarebypassessecurecontainers-131013020951-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How does mobile malware bypass secure containers, wrappers and MDM?
How Mobile Malware Bypasses Secure Containers from Lacoon Mobile Security
]]>
1920 4 https://cdn.slidesharecdn.com/ss_thumbnails/howmobilemalwarebypassessecurecontainers-131013020951-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions /slideshow/blackhat-usa-2013-practical-attacks-against-mobile-device-management-solutions/24939210 anatomyofatargetedattackagainstmobiledevices-final-130805085956-phpapp01
Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications mainly phone fraud applications distributed through common application channels - target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings. How are these mobile cyber-espionage attacks carried out? In this engaging session, we present a novel proof-of-concept attack technique which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption. http://www.blackhat.com/us-13/briefings.html#Brodie]]>

Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications mainly phone fraud applications distributed through common application channels - target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings. How are these mobile cyber-espionage attacks carried out? In this engaging session, we present a novel proof-of-concept attack technique which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption. http://www.blackhat.com/us-13/briefings.html#Brodie]]>
Mon, 05 Aug 2013 08:59:56 GMT /slideshow/blackhat-usa-2013-practical-attacks-against-mobile-device-management-solutions/24939210 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions LacoonMobileSecurity Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications mainly phone fraud applications distributed through common application channels - target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings. How are these mobile cyber-espionage attacks carried out? In this engaging session, we present a novel proof-of-concept attack technique which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption. http://www.blackhat.com/us-13/briefings.html#Brodie <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/anatomyofatargetedattackagainstmobiledevices-final-130805085956-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications mainly phone fraud applications distributed through common application channels - target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings. How are these mobile cyber-espionage attacks carried out? In this engaging session, we present a novel proof-of-concept attack technique which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption. http://www.blackhat.com/us-13/briefings.html#Brodie
BlackHat USA 2013 - Practical Attacks against Mobile Device Management Solutions from Lacoon Mobile Security
]]>
2280 5 https://cdn.slidesharecdn.com/ss_thumbnails/anatomyofatargetedattackagainstmobiledevices-final-130805085956-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Anatomy of a Targeted Attack against Mobile Device Management (MDM) /slideshow/anatomy-of-a-targeted-attack-against-mobile-device-management-mdm/24939171 anatomyofatargetedattackagainstmobiledevices-final-130805085843-phpapp02
In this engaging session, we demonstrate a live attack technique aimed at bypassing a popular MDM solution with an email encryption offering. Further, we show how the mobile surveillance software effectively renders the encryption feature useless. This demonstration includes a mobile spyware version which directly accesses the MDMs memory storage, retrieves the plain-text emails and sends them on to a remote server. Finally, we present mitigation techniques to solve against this problem. Differentiate between mass consumer-oriented mobile attacks and targeted mobile cyber-attacks Recognise the shortcoming of MDM as a wholesome security solution Enhance mobile attack mitigation techniques through mobile activity visibility]]>

In this engaging session, we demonstrate a live attack technique aimed at bypassing a popular MDM solution with an email encryption offering. Further, we show how the mobile surveillance software effectively renders the encryption feature useless. This demonstration includes a mobile spyware version which directly accesses the MDMs memory storage, retrieves the plain-text emails and sends them on to a remote server. Finally, we present mitigation techniques to solve against this problem. Differentiate between mass consumer-oriented mobile attacks and targeted mobile cyber-attacks Recognise the shortcoming of MDM as a wholesome security solution Enhance mobile attack mitigation techniques through mobile activity visibility]]>
Mon, 05 Aug 2013 08:58:43 GMT /slideshow/anatomy-of-a-targeted-attack-against-mobile-device-management-mdm/24939171 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) Anatomy of a Targeted Attack against Mobile Device Management (MDM) LacoonMobileSecurity In this engaging session, we demonstrate a live attack technique aimed at bypassing a popular MDM solution with an email encryption offering. Further, we show how the mobile surveillance software effectively renders the encryption feature useless. This demonstration includes a mobile spyware version which directly accesses the MDMs memory storage, retrieves the plain-text emails and sends them on to a remote server. Finally, we present mitigation techniques to solve against this problem. Differentiate between mass consumer-oriented mobile attacks and targeted mobile cyber-attacks Recognise the shortcoming of MDM as a wholesome security solution Enhance mobile attack mitigation techniques through mobile activity visibility <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/anatomyofatargetedattackagainstmobiledevices-final-130805085843-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this engaging session, we demonstrate a live attack technique aimed at bypassing a popular MDM solution with an email encryption offering. Further, we show how the mobile surveillance software effectively renders the encryption feature useless. This demonstration includes a mobile spyware version which directly accesses the MDMs memory storage, retrieves the plain-text emails and sends them on to a remote server. Finally, we present mitigation techniques to solve against this problem. Differentiate between mass consumer-oriented mobile attacks and targeted mobile cyber-attacks Recognise the shortcoming of MDM as a wholesome security solution Enhance mobile attack mitigation techniques through mobile activity visibility
Anatomy of a Targeted Attack against Mobile Device Management (MDM) from Lacoon Mobile Security
]]>
1068 2 https://cdn.slidesharecdn.com/ss_thumbnails/anatomyofatargetedattackagainstmobiledevices-final-130805085843-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM) /slideshow/lacoon-attacksmdmbheu2013final/24938988 lacoon-attacks-mdm-bheu-2013-final-130805085209-phpapp01
Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications, mainly phone fraud applications distributed through common application channels, target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings. How are these mobile cyber-espionage attacks carried out? In this engaging session, we present novel proof-of-concept attack techniques - both on Android and iOS devices - which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption.]]>

Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications, mainly phone fraud applications distributed through common application channels, target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings. How are these mobile cyber-espionage attacks carried out? In this engaging session, we present novel proof-of-concept attack techniques - both on Android and iOS devices - which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption.]]>
Mon, 05 Aug 2013 08:52:09 GMT /slideshow/lacoon-attacksmdmbheu2013final/24938988 LacoonMobileSecurity@slideshare.net(LacoonMobileSecurity) BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM) LacoonMobileSecurity Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications, mainly phone fraud applications distributed through common application channels, target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings. How are these mobile cyber-espionage attacks carried out? In this engaging session, we present novel proof-of-concept attack techniques - both on Android and iOS devices - which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lacoon-attacks-mdm-bheu-2013-final-130805085209-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications, mainly phone fraud applications distributed through common application channels, target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings. How are these mobile cyber-espionage attacks carried out? In this engaging session, we present novel proof-of-concept attack techniques - both on Android and iOS devices - which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption.
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM) from Lacoon Mobile Security
]]>
2366 4 https://cdn.slidesharecdn.com/ss_thumbnails/lacoon-attacks-mdm-bheu-2013-final-130805085209-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-LacoonMobileSecurity-48x48.jpg?cb=1528751032 Lacoon Mobile Security protects the worlds leading organizations from advanced mobile threats. Lacoon empowers the new mobile enterprise to embrace all types of mobile devices and applications while protecting their resources from cyber-espionage and cyber-crime. Lacoon solutions uniquely assesses mobile risks, detects malicious mobile applications and advanced persistent threats (APTs), and eliminates all types of emerging, targeted and zero-day mobile attacks. www.lacoon.com https://cdn.slidesharecdn.com/ss_thumbnails/lacoon-checkpoint-mrat-report-150219103238-conversion-gate02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/lacoon-check-pointmratreport/44886170 Mobile Threats: Enterp... https://cdn.slidesharecdn.com/ss_thumbnails/bhusattacksvdi-140815225936-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/bh-us-attacksvdi/38040987 Black Hat USA 2014 - A... https://cdn.slidesharecdn.com/ss_thumbnails/bleeding-in-the-browser-140428083405-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/bleeding-inthebrowser/34029314 &quot;Bleeding-In-The-Brows...