SlideShare a Scribd company logo
1 of 17
Download to read offline
root@1337:~#
Mobile Security in the age of
Advanced Persistent Threats
#
Anwar Mohamed
startx
root@1337:~#
Think You’re Immune From
Mobile Malware Attacks?
Think Again
startx
root@1337:~# echo ‘Agenda’
3
# Security in the Mobile Ecosystem
# Mobile Malware Evolution
# Advanced Persistent Threats
# What's next ?
root@1337:~# whoami
4
# Anwar Mohamed, @anwarelmakrahy
# Mobile Security Researcher
# Undergraduate @ Faculty of Engineering, Alex Univ.
# Research Interests includes: Advanced Persistent Threats, ARM
TrustZone Exploitation, Advanced Baseband Attacks, Baseband Firewalls,
GSM End-to-end Encryption, Dex Obfuscation Techniques.
root@1337:~# echo 'Security in the Mobile Ecosystem'
5
● Mobile Network Security Vulnerabilities
● Carrier networks.
● Personal networks.
● Mobile Device Hardware Vulnerabilities
● Chipsets (baseband, memory, processors)
● Supply chain problems.
● Mobile Platform Operating System Vulnerabilities
● IOS
● Android
● Windows Phone
● Mobile Application Security Landscape
● Malicious apps & enterprise impact.
● Application exploitation of OS vulnerabilities.
root@1337:~# echo 'Mobile Malware Evolution'
6
root@1337:~# echo 'Mobile Malware Evolution'
7
root@1337:~# echo 'Mobile Malware Evolution'
8
root@1337:~# echo 'Mobile Malware Evolution'
9
root@1337:~# echo 'Mobile Malware Evolution'
10
root@1337:~# echo 'APTs targeting Mobile'
11
root@1337:~# echo 'APTs targeting Mobile'
12
root@1337:~# echo 'APTs targeting Mobile'
13
root@1337:~# echo 'APTs targeting Mobile'
14
root@1337:~# echo 'APTs targeting Mobile'
15
root@1337:~# echo 'What's next ?'
16
New/Undisclosed Techniques ?
root@1337:~# shutdown -h now
17
Thank you !#

More Related Content

What's hot

Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESSumit Pandey
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityShouaQureshi
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical HackingVanipriya Sakthivel
 
Chapter 1
Chapter 1Chapter 1
Chapter 1rajjani
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptRohit Yadav
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service securityG Prachi
 

What's hot (20)

Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSES
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer securityHacker cracker cybercrime-computer security
Hacker cracker cybercrime-computer security
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Network Security
Network SecurityNetwork Security
Network Security
 
System Security in Ethical Hacking
System Security in Ethical HackingSystem Security in Ethical Hacking
System Security in Ethical Hacking
 
It
ItIt
It
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Computer network
Computer networkComputer network
Computer network
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 

Viewers also liked

Những sắc màu của bố trong mắt bé
Những sắc màu của bố trong mắt béNhững sắc màu của bố trong mắt bé
Những sắc màu của bố trong mắt bécuongdienbaby05
 
Indépendant Textual Analysis
Indépendant Textual AnalysisIndépendant Textual Analysis
Indépendant Textual Analysisnbakoakela
 
Eltibiz banjarmasin
Eltibiz banjarmasinEltibiz banjarmasin
Eltibiz banjarmasinAbdus samad
 
Storyboard
StoryboardStoryboard
StoryboardWong
 
The Implications of Coprophagy in Multiple Species
The Implications of Coprophagy in Multiple SpeciesThe Implications of Coprophagy in Multiple Species
The Implications of Coprophagy in Multiple SpeciesKristina Parker
 
Newsletter dated 11th June, 2015
 Newsletter dated 11th June, 2015 Newsletter dated 11th June, 2015
Newsletter dated 11th June, 2015Proglobalcorp India
 
VIV Animal Health Summit, Closing CEO-level Conference, Mr. Thomas Shryock, V...
VIV Animal Health Summit, Closing CEO-level Conference, Mr. Thomas Shryock, V...VIV Animal Health Summit, Closing CEO-level Conference, Mr. Thomas Shryock, V...
VIV Animal Health Summit, Closing CEO-level Conference, Mr. Thomas Shryock, V...VIV Corporate
 
Pharmacy Industrial Report By Praveen Singh B.phrma final year
Pharmacy Industrial Report By Praveen Singh B.phrma final yearPharmacy Industrial Report By Praveen Singh B.phrma final year
Pharmacy Industrial Report By Praveen Singh B.phrma final yearPraveen Singh
 
Animal poaching in africa final
Animal poaching in africa finalAnimal poaching in africa final
Animal poaching in africa finaladibabe
 
Process valiadtion
Process valiadtionProcess valiadtion
Process valiadtionSagar Savale
 
Antibiotics Use in Livestock: Implications for Human Health
Antibiotics Use in Livestock: Implications for Human HealthAntibiotics Use in Livestock: Implications for Human Health
Antibiotics Use in Livestock: Implications for Human Healthkismet8985
 
آموزش برنامه نویسی R و نرم افزار R Studio بخش ششم | فرادرس
 آموزش برنامه نویسی R و نرم افزار R Studio بخش ششم | فرادرس آموزش برنامه نویسی R و نرم افزار R Studio بخش ششم | فرادرس
آموزش برنامه نویسی R و نرم افزار R Studio بخش ششم | فرادرسfaradars
 
Alcon (2015) | Agency: Oni360
Alcon (2015) | Agency: Oni360Alcon (2015) | Agency: Oni360
Alcon (2015) | Agency: Oni360Tayub R
 
Esquema modernismo y g98
Esquema modernismo y g98Esquema modernismo y g98
Esquema modernismo y g98sburgoslorenzo
 

Viewers also liked (17)

Những sắc màu của bố trong mắt bé
Những sắc màu của bố trong mắt béNhững sắc màu của bố trong mắt bé
Những sắc màu của bố trong mắt bé
 
Indépendant Textual Analysis
Indépendant Textual AnalysisIndépendant Textual Analysis
Indépendant Textual Analysis
 
Eltibiz banjarmasin
Eltibiz banjarmasinEltibiz banjarmasin
Eltibiz banjarmasin
 
Storyboard
StoryboardStoryboard
Storyboard
 
The Implications of Coprophagy in Multiple Species
The Implications of Coprophagy in Multiple SpeciesThe Implications of Coprophagy in Multiple Species
The Implications of Coprophagy in Multiple Species
 
purushottham cv
purushottham cvpurushottham cv
purushottham cv
 
Newsletter dated 11th June, 2015
 Newsletter dated 11th June, 2015 Newsletter dated 11th June, 2015
Newsletter dated 11th June, 2015
 
report novts
report novtsreport novts
report novts
 
VIV Animal Health Summit, Closing CEO-level Conference, Mr. Thomas Shryock, V...
VIV Animal Health Summit, Closing CEO-level Conference, Mr. Thomas Shryock, V...VIV Animal Health Summit, Closing CEO-level Conference, Mr. Thomas Shryock, V...
VIV Animal Health Summit, Closing CEO-level Conference, Mr. Thomas Shryock, V...
 
Pharmacy Industrial Report By Praveen Singh B.phrma final year
Pharmacy Industrial Report By Praveen Singh B.phrma final yearPharmacy Industrial Report By Praveen Singh B.phrma final year
Pharmacy Industrial Report By Praveen Singh B.phrma final year
 
Animal poaching in africa final
Animal poaching in africa finalAnimal poaching in africa final
Animal poaching in africa final
 
Process valiadtion
Process valiadtionProcess valiadtion
Process valiadtion
 
Antibiotics Use in Livestock: Implications for Human Health
Antibiotics Use in Livestock: Implications for Human HealthAntibiotics Use in Livestock: Implications for Human Health
Antibiotics Use in Livestock: Implications for Human Health
 
آموزش برنامه نویسی R و نرم افزار R Studio بخش ششم | فرادرس
 آموزش برنامه نویسی R و نرم افزار R Studio بخش ششم | فرادرس آموزش برنامه نویسی R و نرم افزار R Studio بخش ششم | فرادرس
آموزش برنامه نویسی R و نرم افزار R Studio بخش ششم | فرادرس
 
Roller pump
Roller pumpRoller pump
Roller pump
 
Alcon (2015) | Agency: Oni360
Alcon (2015) | Agency: Oni360Alcon (2015) | Agency: Oni360
Alcon (2015) | Agency: Oni360
 
Esquema modernismo y g98
Esquema modernismo y g98Esquema modernismo y g98
Esquema modernismo y g98
 

Similar to CSCAMP2015 - Mobile Security in the age of APTs

Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsDenim Group
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...eightbit
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareAmmar WK
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...IBM Security
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Filip Maertens
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...viaForensics
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 

Similar to CSCAMP2015 - Mobile Security in the age of APTs (20)

Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
 
Sangfor ngfw 修订版
Sangfor ngfw 修订版Sangfor ngfw 修订版
Sangfor ngfw 修订版
 
Communication security 2021
Communication security 2021Communication security 2021
Communication security 2021
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Code protection
Code protectionCode protection
Code protection
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 

CSCAMP2015 - Mobile Security in the age of APTs