Main Content

Five Mobile Computing Vulnerabilities You Need to Know

About the Talk

May 1, 2015 11:30 AM

Las Vegas, NV

Las Vegas, NV

You've been researching mobile devices and security for years now but so have the bad guys. Each day, black hat and white hat researchers are finding new security flaws in mobile devices, and not all of them have are widely known. We'll examine five key weaknesses in Android and Apple devices, and offer an inside look on how attackers take advantage of them. We'll also explore the strengths and weaknesses of these increasingly-popular devices, and how you can develop a strategy for protecting them that is compatible with your other endpoint security tools and practices.

Ratings and Recommendations

This Talk hasn't been rated yet. Sign In to rate Talks.

comments powered by Disqus